Advisories Blog | G5 Cyber Security

Open Source CERT Security Advisory 2009.9

CamlImages versions 2.2 and below suffer from several integer overflows which may lead to a potentially exploitable heap overflow and result in arbitrary code execution. The vulnerability is triggered by PNG image parsing, the read_png_file and read_png_file_as_rgb24 functions do not properly validate the width and height of the image. Specific PNG images with large width and height can be crafted to trigger the vulnerability.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/78877/oCERT-2009-009.txt

Source: https://packetstormsecurity.com/files/78877/Open-Source-CERT-Security-Advisory-2009.9.html

Exit mobile version