libpng Vulnerabilities Allow Remote Code Execution and Denial of Service
Summary
CERT-Bund has issued a security advisory regarding multiple vulnerabilities in the libpng library, affecting versions prior to 1.6.56. These vulnerabilities could allow remote attackers to execute arbitrary code or cause a denial of service. The advisory provides mitigation information and details on affected systems.
What changed
CERT-Bund has released a security advisory (WID-SEC-2026-0870) detailing critical vulnerabilities in the libpng library, specifically affecting versions prior to 1.6.56. These vulnerabilities have a CVSS Base Score of 7.6 (High) and a Temporal Score of 6.6 (Medium), indicating a significant risk. Remote, anonymous attackers can exploit these flaws to achieve arbitrary code execution or launch denial-of-service attacks on affected systems, which include Linux, UNIX, Windows, and other operating systems.
Organizations utilizing the libpng library, particularly those involved in software development or distribution, must update to a patched version (1.6.56 or later) to mitigate these risks. While the advisory provides mitigation details, the primary action is to upgrade the libpng library. Failure to do so could result in system compromise or service disruption. The advisory was published on March 25, 2026, with an update on March 26, 2026.
What to do next
- Update libpng library to version 1.6.56 or later
- Review system configurations for potential exploitation vectors
Source document (simplified)
[WID-SEC-2026-0870] libpng: Mehrere Schwachstellen CVSS Base Score 7.6 (hoch) CVSS Temporal Score 6.6 (mittel) Remoteangriff ja Datum 25.03.2026 Stand 26.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Die libpng ist die offizielle Referenzbibliothek für die Darstellung und Manipulation von Bildern im Portable Network Graphics (PNG) Format.
Produkte
25.03.2026
- Open Source libpng <1.6.56
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libpng ausnutzen, um beliebigen Programmcode auszuführen oder einen Denial of Service zu verursachen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.