search menu icon-carat-right cmu-wordmark

CERT Coordination Center

libpng denial of service vulnerability

Vulnerability Note VU#684664

Original Release Date: 2007-05-16 | Last Revised: 2007-08-23

Overview

The libpng library contains a denial-of-service vulnerability.

Description

The libpng library can be used to allow other applications to render PNG images.

The libpng library contains a denial-of-service vulnerability.

From the Libpng-1.2.16-ADVISORY:
This vulnerability could be used to crash a browser when a user tries to view such a malformed PNG file. It is not known whether the vulnerability could be exploited otherwise.

The reason is that png_ptr->num_trans is set to 1 and then there is an error return after checking the CRC, so the trans[ ] array is never allocated. Since png_ptr->num_trans is nonzero, libpng tries to use the array later.

    An attacker may be able to exploit this vulnerability by convincing a user to open a specially crafted PNG image. The malicious image may be hosted on a website, or sent as an email attachment.

    Impact

    A remote, unauthenticated attacker may be able to create a denial-of-service condition.

    Solution

    Upgrade
    The libpng team has released a patch for libpng 1.0.25 and 1.2.17 to address this vulnerability. Administrators are encouraged to upgrade as soon as possible. Administrators who receive the libpng library from their operating system vendor should see the systems affected portion of this document for a list of affected vendors.

    Vendor Information

    684664
     

    Debian GNU/Linux Affected

    Notified:  May 08, 2007 Updated: June 08, 2007

    Status

    Affected

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=424729 for more details.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Gentoo Linux Affected

    Notified:  May 08, 2007 Updated: June 08, 2007

    Status

    Affected

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://security.gentoo.org/glsa/glsa-200705-24.xml for more details.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Mandriva, Inc. Affected

    Notified:  May 08, 2007 Updated: June 08, 2007

    Status

    Affected

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Red Hat, Inc. Affected

    Notified:  May 08, 2007 Updated: May 18, 2007

    Status

    Affected

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://rhn.redhat.com/errata/RHSA-2007-0356.html for more detais.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    SUSE Linux Affected

    Notified:  May 08, 2007 Updated: July 13, 2007

    Status

    Affected

    Vendor Statement

    We have released fixed packages for this problem and issued a notice in http://www.novell.com/linux/security/advisories/2007_13_sr.html

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Sun Microsystems, Inc. Affected

    Notified:  May 08, 2007 Updated: August 22, 2007

    Status

    Affected

    Vendor Statement

    Sun can confirm that Solaris 8, 9, and 10 are affected by the issue described in CERT advisory VU#684664

    Sun has published Sun Alert 102987 which includes details of the Solaris specific impact, contributing factors, workaround options and resolution information, and is available here:

    http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1

    The Sun Alert will be kept up to date regarding progress on this issue.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Ubuntu Affected

    Notified:  May 08, 2007 Updated: June 13, 2007

    Status

    Affected

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    libpng Affected

    Notified:  May 07, 2007 Updated: May 16, 2007

    Status

    Affected

    Vendor Statement

    A grayscale PNG image with a malformed (bad CRC) tRNS chunk will crash some libpng applications.

    This vulnerability could be used to crash a browser when a user tries to view such a malformed PNG file. It is not known whether the vulnerability could be exploited otherwise.

    The reason is that png_ptr->num_trans is set to 1 and then there is an error return after checking the CRC, so the trans[] array is never allocated. Since png_ptr->num_trans is nonzero, libpng tries to use the array later.

    This bug was first introduced in libpng version 0.90, in 1996. All versions from libpng-0.90 through libpng-1.2.16 are vulnerable.

    Here is the fix, thanks to Mats Palmgren:

    --- pngrutil.c_1.2.16 2007-05-11 23:11:55.395466000 -0500
    +++ pngrutil.c 2007-05-14 04:37:32.101297000 -0500
    @@ -1314,7 +1314,10 @@
    }

    if (png_crc_finish(png_ptr, 0))
    + {
    + png_ptr->num_trans = 0;
    return;
    + }

    png_set_tRNS(png_ptr, info_ptr, readbuf, png_ptr->num_trans,
    &(png_ptr->trans_values));

    This patch can be applied to any vulnerable version of libpng.

    Libpng version 1.0.25 and 1.2.17, which are being released concurrently
    with this advisory, have been patched.

    This vulnerability has been assigned the identifiers
    CVE-2007-2445 and CERT VU#684664.

    Glenn Randers-Pehrson
    PNG Development Group

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt for more details.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Apple Computer, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Conectiva Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Cray Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    EMC, Inc. (formerly Data General Corporation) Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Engarde Secure Linux Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    F5 Networks, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Fedora Project Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    FreeBSD, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Fujitsu Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Hewlett-Packard Company Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Hitachi Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    IBM Corporation Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    IBM Corporation (zseries) Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    IBM eServer Unknown

    Notified:  May 08, 2007 Updated: May 23, 2007

    Status

    Unknown

    Vendor Statement

    For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to

    https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/securityalerts?OpenDocument&pathID=

    In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to http://app-06.www.ibm.com/servers/resourcelink and follow the steps for registration.

    All questions should be referred to servsec@us.ibm.com.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Immunix Communications, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Ingrian Networks, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Juniper Networks, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Microsoft Corporation Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    MontaVista Software, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Mozilla Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    NEC Corporation Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    NetBSD Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Nokia Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Novell, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    OpenBSD Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Openwall GNU/*/Linux Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    QNX, Software Systems, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Silicon Graphics, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Slackware Linux Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Sony Corporation Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    The SCO Group Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Trustix Secure Linux Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Turbolinux Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Unisys Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Wind River Systems, Inc. Unknown

    Notified:  May 08, 2007 Updated: May 08, 2007

    Status

    Unknown

    Vendor Statement

    We have not received a statement from the vendor.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    View all 43 vendors View less vendors


    CVSS Metrics

    Group Score Vector
    Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
    Temporal 0 E:ND/RL:ND/RC:ND
    Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

    References

    Acknowledgements

    Thanks to the libpng team for information that was used in this report.

    This document was written by Ryan Giobbi.

    Other Information

    CVE IDs: CVE-2007-2445
    Severity Metric: 3.86
    Date Public: 2007-05-16
    Date First Published: 2007-05-16
    Date Last Updated: 2007-08-23 01:06 UTC
    Document Revision: 22

    Sponsored by CISA.