blob: 77e9b19bfb1dd04847e7e380822bb455a140dd03 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200603-18">
<title>Pngcrush: Buffer overflow</title>
Pngcrush is vulnerable to a buffer overflow which could potentially lead to
the execution of arbitrary code.
<product type="ebuild">pngcrush</product>
<announced>March 21, 2006</announced>
<revised>March 21, 2006: 01</revised>
<package name="media-gfx/pngcrush" auto="yes" arch="*">
<unaffected range="ge">1.6.2</unaffected>
<vulnerable range="lt">1.6.2</vulnerable>
Pngcrush is an optimizer for PNG files.
Carsten Lohrke of Gentoo Linux reported that Pngcrush contains a
vulnerable version of zlib (GLSA 200507-19).
<impact type="normal">
By creating a specially crafted data stream, attackers can
overwrite data structures for applications that use Pngcrush, resulting
in a Denial of Service and potentially arbitrary code execution.
There is no known workaround at this time.
All Pngcrush users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/pngcrush-1.6.2&quot;</code>
<uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
<uri link="">CVE-2005-1849</uri>
<metadata tag="requester" timestamp="Wed, 22 Feb 2006 18:06:23 +0000">
<metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 17:03:15 +0000">
<metadata tag="submitter" timestamp="Sat, 18 Mar 2006 02:00:13 +0000">