Check Point Reference: | CPAI-2012-227 |
Date Published: | 14 May 2012 |
Severity: | Critical |
Last Updated: | Friday 22 November, 2024 |
Source: | CVE-2011-3045 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | PNG Development Group libpng 1.4.10 and prior |
Vulnerability Description | An integer overflow vulnerability has been reported in libpng, an open source implementation of the PNG specification. |
Vulnerability Details | The vulnerability is due to a type conversion flaw. Remote attackers could exploit this vulnerability by sending a specially crafted PNG file to the vulnerable service. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the affected service. |
This protection will detect and block malicious PNG files.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Web Server Enforcement Violation
Attack Information: libpng png_inflate Buffer Overflow