Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 140-1 (libpng2, libpng3)

Information

Severity

Severity

Low

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

2.1

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing an update to libpng2, libpng3 announced via advisory DSA 140-1.

Insight

Insight

Developers of the PNG library have fixed a buffer overflow in the progressive reader when the PNG datastream contains more IDAT data than indicated by the IHDR chunk. Such deliberately malformed datastreams would crash applications which could potentially allow an attacker to execute malicious code. Programs such as Galeon, Konquerer and various others make use of these libraries. To find out which packages depend on this library, you may want to execute the following commands: apt-cache showpkg libpng2 apt-cache showpkg libpng3 This problem has been fixed in version 1.0.12-3.woody.1 of libpng and version 1.2.1-1.1.woody.1 of libpng3 for the current stable distribution (woody) and in version 1.0.12-4 of libpng and version 1.2.1-2 of libpng3 for the unstable distribution (sid). We recommend that you upgrade your libpng packages immediately and

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20140-1

Common Vulnerabilities and Exposures (CVE)