Mandriva Linux Security Advisory : libpng12 (MDVSA-2015:071)

medium Nessus Plugin ID 82324

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated libpng12 package fixes security vulnerabilities :

The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PLTE chunk of zero bytes or a NULL palette, related to pngrtran.c and pngset.c (CVE-2013-6954).

An integer overflow leading to a heap-based buffer overflow was found in the png_set_sPLT() and png_set_text_2() API functions of libpng. An attacker could create a specially crafted image file and render it with an application written to explicitly call png_set_sPLT() or png_set_text_2() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application (CVE-2013-7353).

An integer overflow leading to a heap-based buffer overflow was found in the png_set_unknown_chunks() API function of libpng. An attacker could create a specially crafted image file and render it with an application written to explicitly call png_set_unknown_chunks() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application (CVE-2013-7354).

Solution

Update the affected lib64png12-devel and / or lib64png12_0 packages.

See Also

http://advisories.mageia.org/MGASA-2014-0076.html

http://advisories.mageia.org/MGASA-2014-0211.html

Plugin Details

Severity: Medium

ID: 82324

File Name: mandriva_MDVSA-2015-071.nasl

Version: 1.4

Type: local

Published: 3/30/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64png12-devel, p-cpe:/a:mandriva:linux:lib64png12_0, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/27/2015

Reference Information

CVE: CVE-2013-6954, CVE-2013-7353, CVE-2013-7354

MDVSA: 2015:071