Dillo, an open source graphical web browser, suffers from an integer overflow which may lead to a potentially exploitable heap overflow and result in arbitrary code execution. The vulnerability is triggered by HTML pages with embedded PNG images, the Png_datainfo_callback function does not properly validate the width and height of the image. Specific PNG images with large width and height can be crafted to trigger the vulnerability. Fixed in version 2.1.1
dillo-0.8.6-alt6 -> sisyphus: * Sun Jul 05 2009 Nikolay A. Fetisov <naf@altlinux> 0.8.6-alt6 - Security fix (CVE-2009-2294) (Closes: 20680)
Закрыто в 0.8.6-alt6, 0.8.6-alt5.M50.1, 0.8.6-alt5.M41.1 0.8.6-alt5.M40.1.