FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  454327
Date:      2017-11-16
Time:      19:05:01Z
Committer: jkim

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
c564f9bd-8ba7-11e4-801f-0022156e8794png -- heap overflow for 32-bit builds

32-bit builds of PNG library are vulnerable to an unsigned integer overflow that is triggered by a crafted wide interlaced images. Overflow results in a heap corruption that will crash the application and may lead to the controlled overwrite of a selected portions of process address space.


Discovery 2014-12-23
Entry 2015-01-05
png
ge 1.2.6 lt 1.5.21

ge 1.6 lt 1.6.16

http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
http://codelabs.ru/security/vulns/analysis/libpng/2014-dec-libpng-1.6.15/
262b92fe-81c8-11e1-8899-001ec9578670png -- memory corruption/possible remote code execution

The PNG project reports:

libpng fails to correctly handle malloc() failures for text chunks (in png_set_text_2()), which can lead to memory corruption and the possibility of remote code execution.


Discovery 2012-03-29
Entry 2012-04-08
png
linux-f10-png
lt 1.4.11

CVE-2011-3048
http://www.libpng.org/pub/png/libpng.html
edef3f2f-82cf-11df-bcce-0018f3e2eb82png -- libpng decompression buffer overflow

The PNG project describes the problem in an advisory:

Several versions of libpng through 1.4.2 (and through 1.2.43 in the older series) contain a bug whereby progressive applications such as web browsers (or the rpng2 demo app included in libpng) could receive an extra row of image data beyond the height reported in the header, potentially leading to an out-of-bounds write to memory (depending on how the application is written) and the possibility of execution of an attacker's code with the privileges of the libpng user (including remote compromise in the case of a libpng-based browser visiting a hostile web site).


Discovery 2010-03-30
Entry 2010-06-28
Modified 2010-06-28
png
lt 1.4.3

41174
CVE-2010-1205
http://www.libpng.org/pub/png/libpng.html
1886e195-8b87-11e5-90e7-b499baebfeaflibpng buffer overflow in png_set_PLTE

libpng reports:

CVE for a vulnerability in libpng, all versions, in the png_set_PLTE/png_get_PLTE functions. These functions failed to check for an out-of-range palette when reading or writing PNG files with a bit_depth less than 8. Some applications might read the bit depth from the IHDR chunk and allocate memory for a 2^N entry palette, while libpng can return a palette with up to 256 entries even when the bit depth is less than 8.


Discovery 2015-11-15
Entry 2015-11-15
Modified 2015-12-08
png
lt 1.6.20

http://www.openwall.com/lists/oss-security/2015/11/12/2
http://www.openwall.com/lists/oss-security/2015/12/03/6
CVE-2015-8126
CVE-2015-8472
57c705d6-12ae-11dd-bab7-0016179b2dd5png -- unknown chunk processing uninitialized memory access

Secunia reports:

Tavis Ormandy has reported a vulnerability in libpng, which can be exploited by malicious people to cause a Denial of Service, disclose potentially sensitive information, or potentially compromise an application using the library.

The vulnerability is caused due to the improper handling of PNG chunks unknown to the library. This can be exploited to trigger the use of uninitialized memory in e.g. a free() call via unknown PNG chunks having a length of zero.

Successful exploitation may allow execution of arbitrary code, but requires that the application calls the png_set_read_user_chunk_fn() function or the png_set_keep_unknown_chunks() function under specific conditions.


Discovery 2008-04-12
Entry 2008-04-25
Modified 2008-04-29
png
lt 1.2.27

CVE-2008-1382
28770
http://secunia.com/advisories/29792
http://libpng.sourceforge.net/Advisory-1.2.26.txt
edef3f2f-82cf-11df-bcce-0018f3e2eb82png -- libpng decompression buffer overflow

The PNG project describes the problem in an advisory:

Several versions of libpng through 1.4.2 (and through 1.2.43 in the older series) contain a bug whereby progressive applications such as web browsers (or the rpng2 demo app included in libpng) could receive an extra row of image data beyond the height reported in the header, potentially leading to an out-of-bounds write to memory (depending on how the application is written) and the possibility of execution of an attacker's code with the privileges of the libpng user (including remote compromise in the case of a libpng-based browser visiting a hostile web site).


Discovery 2010-03-30
Entry 2010-06-28
Modified 2010-06-28
png
lt 1.4.3

41174
CVE-2010-1205
http://www.libpng.org/pub/png/libpng.html
57c705d6-12ae-11dd-bab7-0016179b2dd5png -- unknown chunk processing uninitialized memory access

Secunia reports:

Tavis Ormandy has reported a vulnerability in libpng, which can be exploited by malicious people to cause a Denial of Service, disclose potentially sensitive information, or potentially compromise an application using the library.

The vulnerability is caused due to the improper handling of PNG chunks unknown to the library. This can be exploited to trigger the use of uninitialized memory in e.g. a free() call via unknown PNG chunks having a length of zero.

Successful exploitation may allow execution of arbitrary code, but requires that the application calls the png_set_read_user_chunk_fn() function or the png_set_keep_unknown_chunks() function under specific conditions.


Discovery 2008-04-12
Entry 2008-04-25
Modified 2008-04-29
png
lt 1.2.27

CVE-2008-1382
28770
http://secunia.com/advisories/29792
http://libpng.sourceforge.net/Advisory-1.2.26.txt