oss-sec mailing list archives
CVE request: OptiPNG Palette Reduction Use-After-Free Vulnerability
From: Agostino Sarubbo <ago () gentoo org>
Date: Mon, 17 Sep 2012 18:36:25 +0200
Quoting the secunia advisory: Description A vulnerability has been reported in OptiPNG, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a use-after-free error related to the palette reduction functionality. No further information is currently available. Success exploitation may allow execution of arbitrary code. The vulnerability is reported in version 0.7, 0.7.1, and 0.7.2. Solution Update to version 0.7.3. Code commit: http://optipng.hg.sourceforge.net/hgweb/optipng/optipng/rev/f1d5d44670a2 Additional info: Version 0.6.5 and earlier are not affected. -- Agostino Sarubbo / ago -at- gentoo.org Gentoo/AMD64 Arch Security Liaison GPG: 0x7CD2DC5D
Attachment:
signature.asc
Description: This is a digitally signed message part.
Current thread:
- CVE request: OptiPNG Palette Reduction Use-After-Free Vulnerability Agostino Sarubbo (Sep 17)
- Re: CVE request: OptiPNG Palette Reduction Use-After-Free Vulnerability Kurt Seifried (Sep 17)