HTTP: PNG Type Chunk Overflow (1)

This signature detects attempts to exploit a known vulnerability against libpng, a library for changing and displaying Portable Network Graphic (PNG) files. libpng v1.2.5 and earlier versions are vulnerable. Attackers can create PNG image files with malformed multiple content type chunks to overflow a buffer in libpng.

Extended Description

The libpng graphics library is reported prone to multiple vulnerabilities. The following issues are reported: - A stack-based buffer-overrun vulnerability resides in the libpng library (CAN-2004-0597). A remote attacker may exploit this condition by supplying a malicious image to an unsuspecting user. When this image is viewed, the vulnerability may be triggered, resulting in code execution in the context of the user that viewed the malicious image. - A denial-of-service vulnerability affects libpng (CAN-2004-0598). A remote attacker may exploit this condition by supplying a malicious image to an unsuspecting user. When the malicious image is viewed, a NULL-pointer dereference will occur, resulting in a crash of the application that is linked to the vulnerable library. - Several integer-overrun vulnerabilities reside in png_handle_sPLT(), png_read_png(), and other functions of libpng (CAN-2004-0599). A remote attacker may exploit the integer-overrun issues by supplying a malicious image to an unsuspecting user. When the malicious image is viewed, an integer value may wrap or may be interpreted incorrectly, resulting in a crash of the application that is linked to the vulnerable library or possibly arbitrary code execution. This BID will be split into independent BIDs when further analysis of these issues is complete. ** Update: Microsoft MSN Messenger and Windows Messenger use an affected version of the libpng library and are therefore affected by this vulnerability. Reportedly, attackers can exploit this while sending images through supported functionality to unsuspecting users running the vulnerable software. Please see the Core Security Technologies Advisory for more information.

Affected Products

Mozilla browser

References

BugTraq: 18385 10857 55333

CVE: CVE-2012-4170

Short Name
HTTP:STC:IMG:PNG-CHUNK-OF-1
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
(1) CVE-2004-0599 CVE-2006-0025 CVE-2012-4170 Chunk Overflow PNG Type bid:10857 bid:18385 bid:55333
Release Date
08/12/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Occasionally
Vendors

Conectiva

Compaq

Trustix

Sun

Libpng

Nortel_networks

Imagemagick

Gentoo

Hp

Mozilla

Avaya

Graphicsmagick

Debian

Openpkg

Mandriva

Adobe

Microsoft

Red_hat

Sco

Suse

Apple

Turbolinux

Netscape

Sgi

CVSS Score

9.3

5.0

Found a potential security threat?