CVE-2004-0597

Publication date 23 November 2004

Last updated 24 July 2024


Ubuntu priority

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

Status

Package Ubuntu Release Status
libpng 7.04 feisty
Fixed 1.2.15~beta5-1ubuntu1
6.10 edgy
Fixed 1.2.8rel-5.1ubuntu0.2
6.06 LTS dapper
Fixed 1.2.8rel-5ubuntu0.2
libpng3 7.04 feisty Not in release
6.10 edgy
Fixed 1.2.8rel-1ubuntu3
6.06 LTS dapper
Fixed 1.2.8rel-1ubuntu3