Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200805-10 ] Pngcrush: User-assisted execution of arbitrary code
Date: Sun, 11 May 2008 21:45:45
Message-Id: 482768C4.1070101@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200805-10
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Pngcrush: User-assisted execution of arbitrary code
12 Date: May 11, 2008
13 Bugs: #219033
14 ID: 200805-10
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A vulnerability in Pngcrush might result in user-assisted execution of
22 arbitrary code.
23
24 Background
25 ==========
26
27 Pngcrush is a multi platform optimizer for PNG (Portable Network
28 Graphics) files.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 media-gfx/pngcrush < 1.6.4-r1 >= 1.6.4-r1
37
38 Description
39 ===========
40
41 It has been reported that Pngcrush includes a copy of libpng that is
42 vulnerable to a memory corruption (GLSA 200804-15).
43
44 Impact
45 ======
46
47 A remote attacker could entice a user to process a specially crafted
48 PNG image, possibly resulting in the execution of arbitrary code with
49 the privileges of the user running the application, or a Denial of
50 Service.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Pngcrush users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.4-r1"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2008-1382
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382
70 [ 2 ] GLSA 200804-15
71 http://www.gentoo.org/security/en/glsa/glsa-200804-15.xml
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200805-10.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2008 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5
100 -----BEGIN PGP SIGNATURE-----
101 Version: GnuPG v2.0.7 (GNU/Linux)
102 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
103
104 iD8DBQFIJ2jEuhJ+ozIKI5gRAvRlAJsE+uTJB71quUjsvbLBmCOLxMRxDQCgiDKG
105 LgG2O2wKtKMVI6/onkIuHKo=
106 =fp9X
107 -----END PGP SIGNATURE-----
108 --
109 gentoo-announce@l.g.o mailing list