Users of Debian Security Advisory please be advised of a New libpng packages fix several vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
DSA 2072-1: DSA 2072-1 - New libpng packages fix several vulnerabilities
Debian Security Advisory
Several vulnerabilities have been discovered in libpng, a library for
reading and writing PNG files. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2010-1205
It was discovered a buffer overflow in libpng which allows remote
attackers to execute arbitrary code via a PNG image that triggers
an additional data row.
CVE-2010-2249
It was discovered a memory leak in libpng which allows remote
attackers to cause a denial of service (memory consumption and
application crash) via a PNG image containing malformed Physical
Scale (aka sCAL) chunksRead more at www.criticalwatch.com
See this Amp at http://bit.ly/dkQsSw

No comments:
Post a Comment