Revision Date: | 2013-04-29 | Version: | 13 | Title: | libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory. | Description: | libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2008-1382
| Platform(s): | CentOS Linux 4 CentOS Linux 5 Oracle Linux 4 Oracle Linux 5 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5
| Product(s): | | Definition Synopsis | OS Section: RHEL4, CentOS4, Oracle Linux 4 RHEL4, CentOS4 or Oracle Linux 4
The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
libpng10-devel is earlier than 0:1.0.16-3.el4_7.3
OR libpng-devel is earlier than 2:1.2.7-3.el4_7.2
OR libpng is earlier than 2:1.2.7-3.el4_7.2
OR libpng10 is earlier than 0:1.0.16-3.el4_7.3
OR OS Section: RHEL5, CentOS5, Oracle Linux 5
RHEL5, CentOS5 or Oracle Linux 5
The operating system installed on the system is Red Hat Enterprise Linux 5
OR The operating system installed on the system is CentOS Linux 5.x
OR Oracle Linux 5.x
AND Configuration section
libpng-devel is earlier than 2:1.2.10-7.1.el5_3.2
OR libpng is earlier than 2:1.2.10-7.1.el5_3.2
|
|