Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
| Software | From | Fixed in |
|---|---|---|
| libpng / libpng | 1.5.0 | 1.5.4 |
| libpng / libpng | 1.4.0 | 1.4.8 |
| libpng / libpng | 1.2.0 | 1.2.45 |
| libpng / libpng | 1.0.0 | 1.0.55 |
| fedoraproject / fedora | 14 | 14.x |
| debian / debian_linux | 5.0 | 5.0.x |
| debian / debian_linux | 6.0 | 6.0.x |
| canonical / ubuntu_linux | 10.10 | 10.10.x |
| canonical / ubuntu_linux | 11.04 | 11.04.x |
| canonical / ubuntu_linux | 10.04 | 10.04.x |
| canonical / ubuntu_linux | 8.04 | 8.04.x |