Get a Pentest and security assessment of your IT network.

Advisories

Open Source CERT Security Advisory 2009.9

CamlImages versions 2.2 and below suffer from several integer overflows which may lead to a potentially exploitable heap overflow and result in arbitrary code execution. The vulnerability is triggered by PNG image parsing, the read_png_file and read_png_file_as_rgb24 functions do not properly validate the width and height of the image. Specific PNG images with large width and height can be crafted to trigger the vulnerability.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/78877/oCERT-2009-009.txt

Source: https://packetstormsecurity.com/files/78877/Open-Source-CERT-Security-Advisory-2009.9.html

Related posts
Advisories

CSIS2005-1.txt

Advisories

Secunia Security Advisory 17625

Advisories

Secunia Security Advisory 20411

Advisories

Secunia Security Advisory 23300