CVE-2007-5269

Priority
Medium
Description
Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21
allow remote attackers to cause a denial of service (crash) via crafted (1)
pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt
(png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT
(png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read
operations.
References
Notes
jdstrand> assigned medium because of wide install base
jdstrand> looking at diff between 1.2.20 and 1.2.21, it appears that Ubuntu
is affected, though Debian thinks not. After weeding out the changes,
there are 9 chunks over pngpread.c and pngrutil.c that appear to be for
this CVE (the original patch improperly used png_strncpy, where our versions
have png_strcpy). TODO: get a reproducer and/or verify png_strcpy is really
not vulnerable.
jdstrand> after talking on IRC, Debian agreed they are in fact affected
jdstrand> 2007/10/24 RH update:
https://rhn.redhat.com/errata/RHSA-2007-0992.html
jdstrand> RH has added code to pngrtran.c that was not included upstream.
Sticking with changes to pngpread.c and pngrutil.c until upstream can
provide a reproducer.
Assigned-to
jdstrand
Package
Upstream:released (1.0.29 and 1.2.21)
Ubuntu 8.04 LTS (Hardy Heron):not-affected (1.2.15~beta5-3)
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:18:15 UTC (commit 5347)