VU#684664 - libpng denial of service vulnerability
Notes
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Notes
Report a Vulnerability
Disclosure Guidance
VINCE
libpng denial of service vulnerability
Vulnerability Note VU#684664
Original Release Date: 2007-05-16 | Last Revised: 2007-08-23
Overview
The libpng library contains a denial-of-service vulnerability.
Description
The libpng library can be used to allow other applications to render
PNG
images.
The libpng library contains a denial-of-service vulnerability.
From the
Libpng-1.2.16-ADVISORY
This vulnerability could be used to crash a browser when a user tries to view such a malformed PNG file. It is not known whether the vulnerability could be exploited otherwise.
The reason is that png_ptr->num_trans is set to 1 and then there is an error return after checking the CRC, so the trans[ ] array is never allocated. Since png_ptr->num_trans is nonzero, libpng tries to use the array later.
An attacker may be able to exploit this vulnerability by convincing a user to open a specially crafted PNG image. The malicious image may be hosted on a website, or sent as an email attachment.
Impact
A remote, unauthenticated attacker may be able to create a denial-of-service condition.
Solution
Upgrade
The libpng team has released a patch for libpng 1.0.25 and 1.2.17 to address this vulnerability. Administrators are encouraged to upgrade as soon as possible. Administrators who receive the libpng library from their operating system vendor should see the systems affected portion of this document for a list of affected vendors.
Vendor Information
Expand all
Debian GNU/Linux
Affected
Notified: May 08, 2007
Updated: June 08, 2007
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
See
for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us
email
Gentoo Linux
Affected
Notified: May 08, 2007
Updated: June 08, 2007
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
See
for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us
email
Mandriva, Inc.
Affected
Notified: May 08, 2007
Updated: June 08, 2007
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Red Hat, Inc.
Affected
Notified: May 08, 2007
Updated: May 18, 2007
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
See
for more detais.
If you have feedback, comments, or additional information about this vulnerability, please send us
email
SUSE Linux
Affected
Notified: May 08, 2007
Updated: July 13, 2007
Status
Affected
Vendor Statement
We have released fixed packages for this problem and issued a notice in
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Sun Microsystems, Inc.
Affected
Notified: May 08, 2007
Updated: August 22, 2007
Status
Affected
Vendor Statement
Sun can confirm that Solaris 8, 9, and 10 are affected by the issue described in CERT advisory VU#684664
Sun has published Sun Alert 102987 which includes details of the Solaris specific impact, contributing factors, workaround options and resolution information, and is available here:
The Sun Alert will be kept up to date regarding progress on this issue.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Ubuntu
Affected
Notified: May 08, 2007
Updated: June 13, 2007
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
libpng
Affected
Notified: May 07, 2007
Updated: May 16, 2007
Status
Affected
Vendor Statement
A grayscale PNG image with a malformed (bad CRC) tRNS chunk will crash some libpng applications.
This vulnerability could be used to crash a browser when a user tries to view such a malformed PNG file. It is not known whether the vulnerability could be exploited otherwise.
The reason is that png_ptr->num_trans is set to 1 and then there is an error return after checking the CRC, so the trans[] array is never allocated. Since png_ptr->num_trans is nonzero, libpng tries to use the array later.
This bug was first introduced in libpng version 0.90, in 1996. All versions from libpng-0.90 through libpng-1.2.16 are vulnerable.
Here is the fix, thanks to Mats Palmgren:
--- pngrutil.c_1.2.16 2007-05-11 23:11:55.395466000 -0500
+++ pngrutil.c 2007-05-14 04:37:32.101297000 -0500
@@ -1314,7 +1314,10 @@
if (png_crc_finish(png_ptr, 0))
+ {
+ png_ptr->num_trans = 0;
return;
+ }
png_set_tRNS(png_ptr, info_ptr, readbuf, png_ptr->num_trans,
&(png_ptr->trans_values));
This patch can be applied to any vulnerable version of libpng.
Libpng version 1.0.25 and 1.2.17, which are being released concurrently
with this advisory, have been patched.
This vulnerability has been assigned the identifiers
CVE-2007-2445 and CERT VU#684664.
Glenn Randers-Pehrson
PNG Development Group
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Addendum
See
for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us
email
Apple Computer, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Conectiva Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Cray Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
EMC, Inc. (formerly Data General Corporation)
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Engarde Secure Linux
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
F5 Networks, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Fedora Project
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
FreeBSD, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Fujitsu
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Hewlett-Packard Company
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Hitachi
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
IBM Corporation
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
IBM Corporation (zseries)
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
IBM eServer
Unknown
Notified: May 08, 2007
Updated: May 23, 2007
Status
Unknown
Vendor Statement
For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to
In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to
and follow the steps for registration.
All questions should be referred to servsec@us.ibm.com.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Immunix Communications, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Ingrian Networks, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Juniper Networks, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Microsoft Corporation
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
MontaVista Software, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Mozilla
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
NEC Corporation
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
NetBSD
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Nokia
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Novell, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
OpenBSD
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Openwall GNU/*/Linux
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
QNX, Software Systems, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Silicon Graphics, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Slackware Linux Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Sony Corporation
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
The SCO Group
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Trustix Secure Linux
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Turbolinux
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Unisys
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Wind River Systems, Inc.
Unknown
Notified: May 08, 2007
Updated: May 08, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
View all 43 vendors
View less vendors
CVSS Metrics
Group
Score
Vector
Base
AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal
E:ND/RL:ND/RC:ND
Environmental
CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
References
Acknowledgements
Thanks to the libpng team for information that was used in this report.
This document was written by Ryan Giobbi.
Other Information
CVE IDs:
CVE-2007-2445
Severity Metric:
3.86
Date Public:
2007-05-16
Date First Published:
2007-05-16
Date Last Updated:
2007-08-23 01:06 UTC
Document Revision:
22
About vulnerability notes
Contact us about this vulnerability
Provide a vendor statement
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis
Carnegie Mellon University
Software Engineering Institute
4500 Fifth Avenue
Pittsburgh, PA 15213-2612
412-268-5800
Office Locations
Additional Sites Directory
Legal
Privacy Notice
CMU Ethics Hotline
www.sei.cmu.edu
Contact SEI
Contact CERT/CC
412-268-5800
cert@cert.org
US