{"id":15804,"date":"2026-02-13T18:16:17","date_gmt":"2026-02-13T18:16:17","guid":{"rendered":"https:\/\/newestek.com\/?p=15804"},"modified":"2026-02-13T18:16:17","modified_gmt":"2026-02-13T18:16:17","slug":"researchers-unearth-30-year-old-vulnerability-in-libpng-library","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15804","title":{"rendered":"Researchers unearth 30-year-old vulnerability in libpng library"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Developers have resolved a legacy flaw in the widely used libpng open-source library that existed since the software was released nearly 30 years ago.<\/p>\n<p>The heap buffer overflow in libpng would cause applications on unpatched systems to crash when presented with maliciously crafted PNG graphic images. In worse case scenarios, the <a href=\"https:\/\/www.cvedetails.com\/cve\/CVE-2026-25646\/\">CVE-2026-25646 vulnerability<\/a> could be abused to extract information or trigger remote code execution.<\/p>\n<p>The most serious repercussions of the flaw would be possible only if proceeded by careful heap grooming preparation by a potential attack, so exploitation is far from trivial.<\/p>\n<p>Images capable of exploiting the vulnerability would still need to be valid PNG files. The vulnerability is fixed in libpng version 1.6.55.<\/p>\n<p>Libpng is a reference library that allows applications to read or manipulate PNG raster image files. The technology is bundled with many Linux- and Unix-based operating systems, including <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2026-25646\">Red Hat<\/a> and <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2026-25646\">Debian<\/a>.<\/p>\n<p>The security flaw exists in a function called <code>png_set_quantize<\/code>, which is used for reducing the number of colors in PNG images, and present in all versions of libpng prior to version 1.6.55.<\/p>\n<p>\u201cWhen the function is called with no histogram and the number of colours in the palette is more than twice the maximum supported by the user\u2019s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer,\u201d an <a href=\"https:\/\/github.com\/pnggroup\/libpng\/security\/advisories\/GHSA-g8hp-mq4h-rqm3\">advisory on the flaw explains<\/a>.<\/p>\n<p>Security researchers have released a proof of concept for the vulnerability to demonstrate their concern.<\/p>\n<h2 class=\"wp-block-heading\" id=\"threat-levels\">Threat levels<\/h2>\n<p>The <a href=\"https:\/\/www.tenable.com\/plugins\/nessus\/298457\">flaw<\/a> should not be overlooked but is certainly no reason for panic, according to security experts.<\/p>\n<p>\u201cWhile it\u2019s true this bug existed in the libpng library for three decades, this is not a doomsday-level threat,\u201d said <a href=\"https:\/\/www.tenable.com\/profile\/satnam-narang\">Satnam Narang<\/a>, senior staff research engineer at Tenable, the firm behind the Nessus vulnerability assessment scanner.<\/p>\n<p>The vulnerable <code>png_set_quantize<\/code> function, previously called <code>png_set_dither<\/code>, is rarely used and exploitation of the flaw is tricky.<\/p>\n<p>These factors lower the true severity of this flaw despite the \u201chigh\u201d severity rating and CVSS score of 8.3, according to Narang.<\/p>\n<p>\u201cWhile it is still important to patch flaws like this one as part of the normal patch management process, it shouldn\u2019t be prioritized over vulnerabilities in edge-network devices that are being targeted by nation-state threat actors and ransomware affiliates,\u201d Narang advised.<\/p>\n<h2 class=\"wp-block-heading\" id=\"ai-enabled-bug-hunting-threat\">AI-enabled bug hunting threat<\/h2>\n<p>The discovery of the flaw highlights the uncomfortable truth that there are many lingering vulnerabilities in open-source software libraries \u2014 dormant bugs that the <a href=\"https:\/\/www.csoonline.com\/article\/4082265\/ai-powered-bug-hunting-shakes-up-bounty-industry-for-better-or-worse.html\">wider use of AI tools<\/a> is likely to unearth at greater cadence in future.<\/p>\n<p>\u201cIn combination with the rapid improvement of large language models, it\u2019s likely we\u2019ll see the discovery of a plethora of bugs in the coming months, just as <a href=\"https:\/\/www.csoonline.com\/article\/4128889\/claude-ai-finds-500-high-severity-software-vulnerabilities.html\">Anthropic\u2019s Claude Opus 4.6 was able to find 500 high-severity zero-days<\/a>,\u201d Narang told CSO. \u201cSome of those bugs may be exploited by threat actors, instead of being disclosed via coordination.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Developers have resolved a legacy flaw in the widely used libpng open-source library that existed since the software was released nearly 30 years ago. The heap buffer overflow in libpng would cause applications on unpatched systems to crash when presented with maliciously crafted PNG graphic images. In worse case scenarios, the CVE-2026-25646 vulnerability could be abused to extract information or trigger remote code execution. The&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15804\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15804","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15804"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15804\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}