FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  371856
Date:      2014-10-31
Time:      15:38:00Z
Committer: rea

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
262b92fe-81c8-11e1-8899-001ec9578670png -- memory corruption/possible remote code execution

The PNG project reports:

libpng fails to correctly handle malloc() failures for text chunks (in png_set_text_2()), which can lead to memory corruption and the possibility of remote code execution.


Discovery 2012-03-29
Entry 2012-04-08
png
linux-f10-png
lt 1.4.11

CVE-2011-3048
http://www.libpng.org/pub/png/libpng.html
edef3f2f-82cf-11df-bcce-0018f3e2eb82png -- libpng decompression buffer overflow

The PNG project describes the problem in an advisory:

Several versions of libpng through 1.4.2 (and through 1.2.43 in the older series) contain a bug whereby progressive applications such as web browsers (or the rpng2 demo app included in libpng) could receive an extra row of image data beyond the height reported in the header, potentially leading to an out-of-bounds write to memory (depending on how the application is written) and the possibility of execution of an attacker's code with the privileges of the libpng user (including remote compromise in the case of a libpng-based browser visiting a hostile web site).


Discovery 2010-03-30
Entry 2010-06-28
Modified 2010-06-28
png
lt 1.4.3

41174
CVE-2010-1205
http://www.libpng.org/pub/png/libpng.html
edef3f2f-82cf-11df-bcce-0018f3e2eb82png -- libpng decompression buffer overflow

The PNG project describes the problem in an advisory:

Several versions of libpng through 1.4.2 (and through 1.2.43 in the older series) contain a bug whereby progressive applications such as web browsers (or the rpng2 demo app included in libpng) could receive an extra row of image data beyond the height reported in the header, potentially leading to an out-of-bounds write to memory (depending on how the application is written) and the possibility of execution of an attacker's code with the privileges of the libpng user (including remote compromise in the case of a libpng-based browser visiting a hostile web site).


Discovery 2010-03-30
Entry 2010-06-28
Modified 2010-06-28
png
lt 1.4.3

41174
CVE-2010-1205
http://www.libpng.org/pub/png/libpng.html