Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0534

Опубликовано: 14 июл. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0534: libpng security update (IMPORTANT)

[2:1.2.10-7.1.el5_5.3]

  • Back-port fixes for CVE-2009-2042, CVE-2010-0205, CVE-2010-1205, CVE-2010-2249 Resolves: #609921

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libpng

1.2.10-7.1.el5_5.3

libpng-devel

1.2.10-7.1.el5_5.3

Oracle Linux x86_64

libpng

1.2.10-7.1.el5_5.3

libpng-devel

1.2.10-7.1.el5_5.3

Oracle Linux i386

libpng

1.2.10-7.1.el5_5.3

libpng-devel

1.2.10-7.1.el5_5.3

Связанные уязвимости

fstec
больше 14 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

ubuntu
больше 15 лет назад

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.

redhat
больше 15 лет назад

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.

nvd
больше 15 лет назад

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.

debian
больше 15 лет назад

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before ...