search menu icon-carat-right cmu-wordmark

CERT Coordination Center

libpng chunk decompression integer overflow vulnerability

Vulnerability Note VU#523889

Original Release Date: 2012-02-23 | Last Revised: 2012-03-02

Overview

The libpng library contains an integer overflow vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

The Portable Network Graphics (PNG) image format is used as an alternative to other image formats such as the Graphics Interchange Format (GIF). The libpng reference library is available for application developers to support the PNG image format.

The libpng library contains an integer overflow in the png_decompress_chunk() function, which can result in a buffer overflow.

Impact

By causing libpng to process a specially-crafted PNG file (e.g. by visiting a web page, viewing an email, or opening a document), a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the application that uses libpng.

Solution

Apply an update
This issue has been addressed in libpng versions 1.0.57, 1.2.47, 1.4.9, and 1.5.9. Please check with your software vendor for updates that utilize a fixed version of libpng.

Vendor Information

523889
 

View all 43 vendors View less vendors


CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Jüri Aedla for reporting this vulnerability to the Google Chrome team.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2011-3026
Severity Metric: 24.75
Date Public: 2012-02-15
Date First Published: 2012-02-23
Date Last Updated: 2012-03-02 22:24 UTC
Document Revision: 8

Sponsored by CISA.