User: Password:
|
|
Subscribe / Log in / New account

libgd2: buffer overflows in PNG handling

Package(s):libgd2 CVE #(s):CAN-2004-0990 CAN-2004-0941
Created:October 29, 2004 Updated:June 28, 2006
Description: Several buffer overflows have been discovered in libgd's PNG handling functions.
If an attacker tricked a user into loading a malicious PNG image, they could leverage this into executing arbitrary code in the context of the user opening image. Most importantly, this library is commonly used in PHP. One possible target would be a PHP driven photo website that lets users upload images. Therefore this vulnerability might lead to privilege escalation to a web server's privileges.
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function.
Alerts:
Mandriva MDKSA-2006:114 libwmf 2006-06-27
Red Hat RHSA-2006:0194-01 gd 2006-02-01
Fedora-Legacy FLSA:152838 gd 2005-07-15
Red Hat RHSA-2004:638-01 gd 2004-12-17
Ubuntu USN-33-1 libgd 2004-11-29
Debian DSA-602-1 libgd2 2004-11-29
Debian DSA-601-1 libgd1 2004-11-29
Mandrake MDKSA-2004:132 gd 2004-11-15
Ubuntu USN-25-1 libgd2 2004-11-15
Fedora FEDORA-2004-412 gd 2004-11-11
Fedora FEDORA-2004-411 gd 2004-11-11
Ubuntu USN-21-1 libgd 2004-11-09
Debian DSA-591-1 libgd2 2004-11-09
Debian DSA-589-1 libgd 2004-11-09
Gentoo 200411-08 gd 2004-11-03
OpenPKG OpenPKG-SA-2004.049 gd 2004-10-30
Ubuntu USN-11-1 libgd2 2004-10-28

(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds