Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2004-0597

Published: 23 November 2004

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

Priority

Unknown

Status

Package Release Status
libpng
Launchpad, Ubuntu, Debian
dapper
Released (1.2.8rel-5ubuntu0.2)
edgy
Released (1.2.8rel-5.1ubuntu0.2)
feisty
Released (1.2.15~beta5-1ubuntu1)
upstream Needs triage

libpng3
Launchpad, Ubuntu, Debian
dapper
Released (1.2.8rel-1ubuntu3)
edgy
Released (1.2.8rel-1ubuntu3)
feisty Does not exist

upstream Needs triage