-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0048 Title: Memory corruption vulnerability in libpng [1] Version history: 02.04.2012 Initial publication Summary ======= libpng through 1.5.9, 1.4.10, 1.2.48, and 1.0.58 are vulnerable to memory corruption that can lead to remote arbitrary code execution and denial of service. This vulnerability impacts Linux, Windows and Mac OS platforms. CVE-2011-3048 CVSS v2 Base Score: 6.8 (MEDIUM) (AV:N/AC:M/Au:N/C:P/I:P/A:P) [3] Vulnerable systems ================== libpng through 1.5.9, 1.4.10, 1.2.48, and 1.0.58 Original Details ================ All "modern" versions of libpng through 1.5.9, 1.4.10, 1.2.48, and 1.0.58, respectively, fail to correctly handle malloc() failure for text chunks (in png_set_text_2()), which can lead to memory corruption and the possibility of execution of hostile code. This serious vulnerability has been assigned ID CVE-2011-3048 and is fixed in version 1.5.10 (and versions 1.4.11, 1.2.49, and 1.0.59, respectively, on the older branches), released 29 March 2012. What can you do? ================ Fix is available [1]. Please check your Linux distribution to get a fix from your vendor. What to tell your users? ======================== N/A More information ================ [1] http://www.libpng.org/pub/png/libpng.html [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048 [3] Information about CVSS: http://www.first.org/cvss/cvss-guide.html Best regards, CERT-EU CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 (DISCLAIMER: CERT-EU, the CERT for the EU institutions, is currently in its setup phase, until May 2012. Services are provided in a pilot fashion, and are not yet fully functional. Announcements, alerts and warnings are sent out in best effort manner, and to contact information currently known to us. We apologise if you are not the correct recipient, or if you had already been warned about this issue from another source . Format, content and way of alerting are subject to change in the future. Contact information or even the team name may change as well.) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPecM7AAoJEPpzpNLI8SVo/u0P/1faQslKQKDbcX3RygXz5rGo SIFG4ZT6HQKBRlNeIvNLnQIAOxTtYfazAS3uZBaSmtB82nBTdjK57dkVsOe32wDi imlYtRTNVu3aQosiQzTO0+3tXIseSk5mC/hCD9uyg87Uwj1UJyBg/nNvWCI01FHx MBv8YCr/kSECWJZPGxlfZHgS1rPGr1HdK6jUc1urYSOD4NmGGE5lnB+G0+cSe6zg B9mpjrG/kti/ySJNB6tW4j9BNpepqGXWdDjrxi0HDP/M/CcZyJx6Dq6JozowrajQ yivPaOLghAqhGtlk4RJRsBrRrIIGIb+M5IsYxBRwuF/ZVVEuFRZiXc9zhqfVWjyC M9idukmcDChA/MKZZ7RBcZod1jdCHXqIMue/oDHC+bBXles1BncpR4VWd/KDdaAx 3qAdpJODYciogr0IYovlWz8ghvkNPhsYcU9mPOIoa6bJGRZQCo1dyOreXTrRMIpa P/80XotM/AA2qgoqZ5AqSlcjTYLQxCBJpO9U8o4exS03t55Yxj+YA4naumOH47ku B1rS86/9oFIJ7KGvuoWdj8fXHfO/JWd3JrblvxlCwHdLsZa3V2lsoB5U6JI4pXw+ A6AxKK0uyTB/Zf5+7g9SeqvIGHReWPfOXQIHHRhA7jbckzSsA64h2w4nliqLedZQ Nn2+ZJSS7yCOOGBMrXgR =Z6gl -----END PGP SIGNATURE-----