GLSA 200812-15: POV-Ray: User-assisted execution of arbitrary code

Severity:normal
Title:POV-Ray: User-assisted execution of arbitrary code
Date:12/14/2008
Bugs: #153538
ID:200812-15

Synopsis

POV-Ray includes a version of libpng that might allow for the execution of arbitrary code when reading a specially crafted PNG file

Background

POV-Ray is a well known open-source ray tracer.

Affected packages

Package Vulnerable Unaffected Architecture(s)
media-gfx/povray < 3.6.1-r4 >= 3.6.1-r4 All supported architectures

Description

POV-Ray uses a statically linked copy of libpng to view and output PNG files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964, CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in POV-Ray's build system caused it to load the old version when your installed copy of libpng was >=media-libs/libpng-1.2.10.

Impact

An attacker could entice a user to load a specially crafted PNG file as a texture, resulting in the execution of arbitrary code with the permissions of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All POV-Ray users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-gfx/povray-3.6.1-r4"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200812-15.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!