Security Bulletin: IBM Informix Genero vulnerable to libpng chunk decompression integer overflow vulnerability (CVE-2011-3026).
A remote, unauthenticated attacker can exploit an integer overflow vulnerability in the libpng library to cause a crash or execute malicious code on a vulnerable system.
CVE ID: CVE-2011-3026
The libpng library used by IBM Informix Genero contains an integer overflow vulnerability. If you use IBM Informix Genero to handle PNG (Portable Network Graphics) image files and an attacker causes your IBM Informix Genero program to open or display a malicious PNG file, your IBM Informix Genero application might crash, or could be caused to run malicious code with the privileges of the user running the application.
CVSS Base Score: 6.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/73240 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
IBM Informix Genero releases prior to 2.41 - all platforms
The fix is available in the IBM Informix Genero 2.41 version that became available in Passport Advantage on December 7, 2012. Customers must upgrade to the new version.
Do not support the upload or display of user-supplied .png files in your applications.
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
17 January 2013: Original copy published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
More support for:
Software version: 2.0, 2.1, 2.2, 2.3, 2.4
Operating system(s): AIX, HP-UX, Linux, Solaris
Reference #: 1620982
Modified date: 23 January 2013
Translate this page: