Bugzilla – Bug 866298
VUL-0: CVE-2014-0333: libpng16: denial of service (endless loop) in png_push_read_chunk
Last modified: 2014-03-12 14:04:22 UTC
via rh bugzilla, CVE-2014-0333 The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an ... References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0333 https://sourceforge.net/projects/libpng/files/libpng16/patch-libpng16-vu684412.diff ftp://ftp.simplesystems.org/pub/png/src/libpng16/patch-libpng16-vu684412.diff https://bugzilla.redhat.com/show_bug.cgi?id=1070985 http://www.kb.cert.org/vuls/id/684412 I quickly checked libpng14 and it seems to set the flag correctly. (I cannot make full sense of it though)
(SLE12, factory, 13.1 seem to have libpng16)
bugbot adjusting priority
This is an autogenerated message for OBS integration: This bug (866298) was mentioned in https://build.opensuse.org/request/show/224574 Factory / libpng16
<html><head><title>crash test for bug #974825</title></head> <body> <img alt="Crash Test bug#974825" title="Crash Test bug#974825" src="data:image/png;base64, iVBORw0KGgoAAAANSUhEUgAAAEAAAAAgCAYAAACinX6EAAAAAElEQVRKVU5LdGhlIGp1TmtKVU5LCg= ="> </body> </html> reproducer for firefox provided by Glenn.
Created attachment 581008 [details] extracted png note ...@^@^@IDATJUNKthe juNkJUNK
Created attachment 581009 [details] Progressive png reading example. compile with e. g. $ gcc -D LIBPNG15 -o progrpng progrpng.c -lpng15 Source: http://stackoverflow.com/questions/10437798/libpng-error-not-a-png-file-png-process-data
Tested with -DLIBPNG12, -DLIBPNG15 and -DLIBPNG16. Only libpng16 suffers. $ gcc -D LIBPNG16 -o progrpng progrpng.c -lpng16 $ ./progrpng zero-idat.png [infinity loop, 100% CPU usage] $ gcc -D LIBPNG12 -o progrpng progrpng.c -lpng12 $ ./progrpng zero-idat.png Reading PNG File zero-idat.png info_callback width: 64height: 32bit_depth: 8color_type: 6interlace_type: 0compression_type: 0filter_type: 0channles: 4rowbytes: 256signature: PNG error: IDAT: CRC error $
thanks for cross checking! :)
released
openSUSE-SU-2014:0358-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 866298 CVE References: CVE-2014-0333 Sources used: openSUSE 13.1 (src): libpng16-1.6.6-12.1