---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Sun Solaris libpng Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35302 VERIFY ADVISORY: http://secunia.com/advisories/35302/ DESCRIPTION: Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the libpng library. For more information: SA27093 SA27130 SA29792 SA31781 SA33970 The vulnerabilities are reported in Solaris 9 and 10, OpenSolaris, and GNOME 2.0 for Solaris 8. SOLUTION: Apply patches where available. A final resolution is pending completion for Solaris 8 and 9. -- SPARC Platform -- Solaris 10: Apply patch 137080-03 or later. OpenSolaris: Fixed in build snv_113 and later. -- x86 Platform -- Solaris 10: Apply patch 137081-03 or later. OpenSolaris: Fixed in build snv_113 and later. ORIGINAL ADVISORY: http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1 OTHER REFERENCES: SA27093: http://secunia.com/advisories/27093/ SA27130: http://secunia.com/advisories/27130/ SA29792: http://secunia.com/advisories/29792/ SA31781: http://secunia.com/advisories/31781/ SA33970: http://secunia.com/advisories/33970/ US-CERT VU#649212: http://www.kb.cert.org/vuls/id/649212 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------