Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080414062047.GY10078@fuse.inversepath.com>
Date: Mon, 14 Apr 2008 06:20:47 +0000
From: Andrea Barisani <lcars@...rt.org>
To: ocert-announce@...ts.ocert.org, oss-security@...ts.openwall.com,
        bugtraq@...urityfocus.com
Subject: [oCERT-2008-003] libpng zero-length chunks incorrect handling


2008/04/12 #2008-003 libpng zero-length chunks incorrect handling

Description:

Applications using libpng that install unknown chunk handlers, or copy
unknown chunks, may be vulnerable to a security issue which may result in
incorrect output, information leaks, crashes, or arbitrary code execution.

The issue involves libpng incorrectly handling zero length chunks which
results in uninitialized memory affecting the control flow of the
application.

Affected version:

The libpng project indicates libpng-1.0.6 through 1.0.32, libpng-1.2.0
through 1.2.26, and libpng-1.4.0beta01 through libpng-1.4.0beta19 built with
PNG_READ_UNKNOWN_CHUNKS_SUPPORTED or PNG_READ_USER_CHUNKS_SUPPORTED (default
configuration) are affected.

Fixed version:

libpng version 1.2.27 and 1.0.33 are in beta and will be released on or about
April 26, 2008 according to libpng maintainer

libpng-1.2.27beta01

Credit: Tavis Ormandy, oCERT Team | Google Security Team

CVE: CVE-2008-1382

Timeline:

2008-04-05: contacted libpng maintainers
2008-04-05: vendor confirms
2008-04-05: verification of vendor suggested patch
2008-04-12: libpng-1.2.27beta01 released
2008-04-12: libpng project advisory released
2008-04-12: advisory release

References:
http://libpng.sourceforge.net/Advisory-1.2.26.txt

Links:
http://www.libpng.org/pub/png/libpng.html

Permalink:
http://www.ocert.org/advisories/ocert-2008-003.html

-- 
Andrea Barisani |                Founder & Project Coordinator
          oCERT | Open Source Computer Emergency Response Team

<lcars@...rt.org>                         http://www.ocert.org
 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
        "Pluralitas non est ponenda sine necessitate"

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.