Definition


New Search

Multiple buffer overflows in libpng 1.2.5 and earlier as used in multiple products allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

oval:org.mitre.oval:def:11284

Multiple buffer overflows in libpng 1.2.5 and earlier as used in multiple products allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • CentOS Linux 3
  • Red Hat Enterprise Linux 3
Class:
vulnerability
Reference(s):
  • CVE-2004-0597
Product(s):