The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of libpng: buffer overflow via image size related macros

Synthesis of the vulnerability 

An attacker can generate a buffer overflow of libpng, in order to trigger a denial of service, and possibly to run code.
Vulnerable products: libpng.
Severity of this weakness: 1/4.
Creation date: 26/05/2016.
Références of this bulletin: VIGILANCE-VUL-19710.

Description of the vulnerability 

The libpng library includes macros to calculate the size of a an image line or the whole image.

However, these macros does not check whether the result is bigger that the available address space in 32 bits systems. On these platforms, an ill-formed image may trigger an arithmetic overflow and then a memory corruption.

An attacker can therefore generate a buffer overflow of libpng, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat alert impacts software or systems such as libpng.

Our Vigil@nce team determined that the severity of this computer vulnerability bulletin is low.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this weakness note.

Solutions for this threat 

libpng: version 1.6.22.
The version 1.6.22 is fixed:
  ftp://ftp.simplesystems.org/pub/png/src/libpng16/libpng-1.6.22.tar.xz
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a system vulnerability alert. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.