The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. A flaw was discovered in the way libpng handled PNG images containing “unknown” chunks. If an application linked against libpng attempted to process a malformed, unknown chunk in a malicious PNG image, it could cause the application to crash.
Jueri Aedla discovered this integer overflow in the popular libpng PNG library. This affects all software and applications that depend on libpng. This includes several web browsers and several server side applications. All running applications using libpng or libpng10 must be restarted for the update to take effect.
Package : libpng
Vulnerability : integer overflow
Problem type : remote
CVE ID : CVE-2011-3026
Description : Heap-buffer-overflow in png_decompress_chunk (MFSA 2012-11)
Red Hat Advisory
Type: Security Advisory
Issued on: 2012-02-20
Last updated on: 2012-02-20