![]() ![]() Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc') \ninclude('compat. This leads to a crash, which may be potentially exploitable. In libpng 1.6.34, a wrong calculation of rowfactor in the pngcheckchunklength function (pngrutil. In libpng 1.6.34, a wrong calculation of rowfactor in the pngcheckchunklength function (pngrutil. The text \n# itself is copyright (C) Canonical, Inc. An integer overflow in the libpng library can lead to a heap-buffer overflow when decompressing certain PNG images. How Can You Use Polyspace Static Analysis to Avoid Buffer Overflows INT04-C: Enforce limits on integer values originating from tainted sources ARR30-C: Do. ![]() , at worst it will run out of memory or fail an integer overflow check, all errors are. , "cvelist":, "modified": "T00:00:00", "cpe":, "id": "UBUNTU_USN-1-1.NASL", "href": "", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1-1. Fixed in libpng-1.5.14beta08' ('has four integer overflow bugs' is apparently a typo of 'has one integer overflow bug') Use CVE-2013-7354 for 'The pngsetsPLT() and pngsettext2() functions have a similar bug, which is fixed in libpng-1.5.14rc03' - this has a different discoverer. An integer overflow in the libpng library can lead to a heap-buffer overflow when decompressing certain PNG images. The goal is to provide a fast PNG library with a simpler API than libpng. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |