|
Message-ID: <1375435.1OnNeEHNAf@devil>
Date: Mon, 17 Sep 2012 18:36:25 +0200
From: Agostino Sarubbo <ago@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: OptiPNG Palette Reduction Use-After-Free Vulnerability
Quoting the secunia advisory:
Description
A vulnerability has been reported in OptiPNG, which can be exploited by
malicious people to potentially compromise a user's system.
The vulnerability is caused due to a use-after-free error related to the
palette reduction functionality. No further information is currently
available.
Success exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 0.7, 0.7.1, and 0.7.2.
Solution
Update to version 0.7.3.
Code commit:
http://optipng.hg.sourceforge.net/hgweb/optipng/optipng/rev/f1d5d44670a2
Additional info:
Version 0.6.5 and earlier are not affected.
--
Agostino Sarubbo / ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D
Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.