Saturday, July 24, 2010

Debian Security Advisory : New libpng packages fix several vulnerabilities

Users of Debian Security Advisory please be advised of a New libpng packages fix several vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
DSA 2072-1: DSA 2072-1 - New libpng packages fix several vulnerabilities
Debian Security Advisory
Several vulnerabilities have been discovered in libpng, a library for

reading and writing PNG files. The Common Vulnerabilities and

Exposures project identifies the following problems:



CVE-2010-1205



It was discovered a buffer overflow in libpng which allows remote

attackers to execute arbitrary code via a PNG image that triggers

an additional data row.





CVE-2010-2249



It was discovered a memory leak in libpng which allows remote

attackers to cause a denial of service (memory consumption and

application crash) via a PNG image containing malformed Physical

Scale (aka sCAL) chunksRead more at www.criticalwatch.com
 

No comments:

Post a Comment