Ziproxy PNG Image Processing Buffer Overflow Vulnerability

Summary
The host is running Ziproxy server and is prone to buffer overflow vulnerability.
Impact
Successful exploits may allow remote attackers to execute arbitrary code on the system with elevated privileges or cause the application to crash. Impact Level: Application
Solution
Upgrade to the latest version of Ziproxy 3.1.1 or later, For updates refer to http://sourceforge.net/projects/ziproxy/files/
Insight
The flaw is caused by a heap overflow error in the PNG decoder when processing malformed data, which could be exploited by attackers to crash an affected server or execute arbitrary code via a specially crafted PNG image.
Affected
Ziproxy version 3.1.0
References