Lucene search

K
amazonAmazonALAS-2015-615
HistoryDec 14, 2015 - 10:00 a.m.

Medium: libpng

2015-12-1410:00:00
alas.aws.amazon.com
18

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.12 Low

EPSS

Percentile

95.3%

Issue Overview:

It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-7981)

An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-8472)

Affected Packages:

libpng

Issue Correction:
Run yum update libpng to update your system.

New Packages:

i686:  
    libpng-devel-1.2.49-2.14.amzn1.i686  
    libpng-debuginfo-1.2.49-2.14.amzn1.i686  
    libpng-static-1.2.49-2.14.amzn1.i686  
    libpng-1.2.49-2.14.amzn1.i686  
  
src:  
    libpng-1.2.49-2.14.amzn1.src  
  
x86_64:  
    libpng-debuginfo-1.2.49-2.14.amzn1.x86_64  
    libpng-devel-1.2.49-2.14.amzn1.x86_64  
    libpng-static-1.2.49-2.14.amzn1.x86_64  
    libpng-1.2.49-2.14.amzn1.x86_64  

Additional References

Red Hat: CVE-2015-7981, CVE-2015-8472

Mitre: CVE-2015-7981, CVE-2015-8472

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.12 Low

EPSS

Percentile

95.3%