libpng 1.2.5 and earlier does not properly calculate certain buffer offsets, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
Link | Tags |
---|---|
https://bugzilla.fedora.us/show_bug.cgi?id=1943 | vendor advisory |
http://www.debian.org/security/2004/dsa-536 | patch vendor advisory |
http://security.gentoo.org/glsa/glsa-200812-15.xml | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16914 | vdb entry |
http://secunia.com/advisories/33137 | third party advisory |