Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 09 Jan 2015 18:54:32 -0600
From: endeavor <>
Subject: Re: CVE Request: libpng 1.6.15 Heap Overflow

I thought it might be helpful to add some additional clarity to this bug.
There were two bugs patched in the latest updates to libpng. The first 
bug is an overflow in png_read_IDAT_data, and is triggerable due to 
checks on image width that were removed a while ago in libpng branches 
1.6.x and 1.5.x. This is the bug against which the following write up 
applies: .
While fixing this bug, John Bowler found a second, unrelated overflow in 
png_combine_row. His mailing list post on that bug is found here: . It looks 
like CVE-2014-9495 was assigned against this bug, but attributed to me 
by accident.
As the fixes to either bug don't fix the other, there are actually two 
overflows that need to be tracked for libpng. People backporting changes 
should ensure they fix both bugs.
Both of these bugs are evidence of a larger issue in libpng 1.6.x and 
1.5.x. Those branches allow abnormally large width and height values. On 
64-bit platforms, widths and heights of 0x7fffffff are still allowed. 
Somewhat smaller, but abnormally large widths, and still very large 
heights, are available on 32-bit platforms. The 1.2.x branch only allows 
for the safer values.
Safe limits can be enabled in these libpng branches with 
-DPNG_SAFE_LIMITS_SUPPORTED. These limits are not enabled by default.
I very strongly recommend individuals building libpng 1.5.x and 1.6.x 
- Alex Eubanks

On 1/3/2015 6:05 PM, wrote:
>> I am requesting a CVE for a heap-overflow in libpng 1.6.15. It's my
>> understanding that versions 1.6.9-1.6.15 are vulnerable, and 
>> according to
>> patch notes it looks like some revisions in the 1.5 branch may have been
>> affected as well. However, I've only tested 1.6.15 and can only speak 
>> for
>> it.
>> Link to announcement of new version:
>> Link to a description of the vulnerability:
>> Please let me know!
> Use CVE-2014-9495.
> ---
> CVE assignment team, MITRE CVE Numbering Authority M/S M300
> 202 Burlington Road, Bedford, MA 01730 USA
> [ PGP key available through ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.