LibPNG.tRNS.Buffer.Overflow

description-logoDescription

This indicates a possible attempt to exploit a Buffer Overflow vulnerability in libpng.
The vulnerability is caused because the vulnerable application does not perform sufficient bounds checking. This may allow an attacker to execute arbitrary code on an affected system when a specially crafted image file is opened.

affected-products-logoAffected Products

All versions of libpng prior to 1.2.6 of the 1.2.x series and 1.0.16 of the older 1.0.x series are vulnerable.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply patches or upgrade the library to the latest version, available from the website:
http://www.libpng.org/pub/png/libpng.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)