Lucene search

K
gentooGentoo FoundationGLSA-200603-18
HistoryMar 21, 2006 - 12:00 a.m.

Pngcrush: Buffer overflow

2006-03-2100:00:00
Gentoo Foundation
security.gentoo.org
13

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.114 Low

EPSS

Percentile

95.2%

Background

Pngcrush is an optimizer for PNG files.

Description

Carsten Lohrke of Gentoo Linux reported that Pngcrush contains a vulnerable version of zlib (GLSA 200507-19).

Impact

By creating a specially crafted data stream, attackers can overwrite data structures for applications that use Pngcrush, resulting in a Denial of Service and potentially arbitrary code execution.

Workaround

There is no known workaround at this time.

Resolution

All Pngcrush users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/pngcrush< 1.6.2UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.114 Low

EPSS

Percentile

95.2%