GLSA 200603-18: Pngcrush: Buffer overflow

Severity:normal
Title:Pngcrush: Buffer overflow
Date:03/21/2006
Bugs: #123286
ID:200603-18

Synopsis

Pngcrush is vulnerable to a buffer overflow which could potentially lead to the execution of arbitrary code.

Background

Pngcrush is an optimizer for PNG files.

Affected packages

Package Vulnerable Unaffected Architecture(s)
media-gfx/pngcrush < 1.6.2 >= 1.6.2 All supported architectures

Description

Carsten Lohrke of Gentoo Linux reported that Pngcrush contains a vulnerable version of zlib (GLSA 200507-19).

Impact

By creating a specially crafted data stream, attackers can overwrite data structures for applications that use Pngcrush, resulting in a Denial of Service and potentially arbitrary code execution.

Workaround

There is no known workaround at this time.

Resolution

All Pngcrush users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.2"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200603-18.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!