Rapid7 Vulnerability & Exploit Database

RHSA-2015:2596: libpng security update

Back to Search

RHSA-2015:2596: libpng security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
11/12/2015
Created
07/25/2018
Added
12/10/2015
Modified
03/21/2018

Description

The libpng packages contain a library of functions for creating andmanipulating PNG (Portable Network Graphics) image format files.It was discovered that the png_get_PLTE() and png_set_PLTE() functions oflibpng did not correctly calculate the maximum palette sizes for bit depthsof less than 8. In case an application tried to use these functions incombination with properly calculated palette sizes, this could lead to abuffer overflow or out-of-bounds reads. An attacker could exploit this tocause a crash or potentially execute arbitrary code by tricking anunsuspecting user into processing a specially crafted PNG image. However,the exact impact is dependent on the application using the library.(CVE-2015-8126, CVE-2015-8472)All libpng users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue.

Solution(s)

  • redhat-upgrade-libpng
  • redhat-upgrade-libpng-debuginfo
  • redhat-upgrade-libpng-devel
  • redhat-upgrade-libpng-static

References

  • redhat-upgrade-libpng
  • redhat-upgrade-libpng-debuginfo
  • redhat-upgrade-libpng-devel
  • redhat-upgrade-libpng-static

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;