Note: This is an archival copy of Security Sun Alert 200663 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1000520.1.
Solaris 7 Operating System
Date of Workaround Release
Multiple security vulnerabilities have been discovered in the Portable Network Graphics (PNG) Library libpng(3) which also affect Netscape 6.x/7 shipped with Solaris since Netscape 6.x/7 includes the affected libpng routines. This may allow an unprivileged user to execute arbitrary code with the privileges of a local user. This condition can be exploited when the local user has loaded a Portable Network Graphics (PNG) format image file supplied by an untrusted user and views a malicious web site or views an e-mail message containing a malformed PNG image with that application.
Note: Netscape is utilized as web browser and editor, an irc client, an email client, and a news client.
This issue is also described in the following documents:
CERT Technical Cyber Security Alert TA04-217A at http://www.us-cert.gov/cas/techalerts/TA04-217A.html
CVE CAN-2004-0597 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597
CVE CAN-2004-0598 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598
CVE CAN-2004-0599 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599
This issue can occur in the following releases:
Note: Netscape 7 was shipped in Solaris 9 Update 3 and later updates, and was also available via the Sun Download Center (SDLC) for Solaris 7, 8 and 9 (part of the SUNWnsb package).
To determine the version of Netscape installed on a system, the following command can be run:
$ pkginfo -l SUNWnsb | grep VERSION VERSION: 7.0,REV=10.2002.12.11
To determine which Solaris 9 Update release is installed on the system check the contents of the "/etc/release" file:
$ cat /etc/release Solaris 9 12/03 s9s_u5wos_08b SPARC Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. ...
There are no predictable symptoms that would indicate the described issue has been exploited.
There is no workaround for this issue.
A final resolution is pending completion.
This solution has no attachment