LibPNG.tRNS.Buffer.Overflow
Description
This indicates a possible attempt to exploit a Buffer Overflow vulnerability in libpng.
The vulnerability is caused because the vulnerable application does not perform sufficient bounds checking. This may allow an attacker to execute arbitrary code on an affected system when a specially crafted image file is opened.
Affected Products
All versions of libpng prior to 1.2.6 of the 1.2.x series and 1.0.16 of the older 1.0.x series are vulnerable.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patches or upgrade the library to the latest version, available from the website:
http://www.libpng.org/pub/png/libpng.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |