MGASA-2014-0211

Source
https://advisories.mageia.org/MGASA-2014-0211.html
Import Source
https://advisories.mageia.org/MGASA-2014-0211.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0211
Related
Published
2014-05-10T19:36:04Z
Modified
2014-05-10T19:35:51Z
Summary
Updated libpng packages fix two security vulnerabilities
Details

Updated libpng12 packages fix security vulnerabilities:

An integer overflow leading to a heap-based buffer overflow was found in the pngsetsPLT() and pngsettext2() API functions of libpng. An attacker could create a specially-crafted image file and render it with an application written to explicitly call pngsetsPLT() or pngsettext2() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application (CVE-2013-7353).

An integer overflow leading to a heap-based buffer overflow was found in the pngsetunknownchunks() API function of libpng. An attacker could create a specially-crafted image file and render it with an application written to explicitly call pngsetunknownchunks() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application (CVE-2013-7354).

References
Credits

Affected packages