ID |
CVE-2007-2756
|
Summary |
The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.3 (as of 11-10-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:N/A:P
|
oval
via4
|
accepted | 2013-04-29T04:08:39.120-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 3 | oval | oval:org.mitre.oval:def:11782 |
comment | CentOS Linux 3.x | oval | oval:org.mitre.oval:def:16651 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng. | family | unix | id | oval:org.mitre.oval:def:10779 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng. | version | 30 |
|
redhat
via4
|
advisories | | rpms | - php-0:4.3.2-43.ent
- php-debuginfo-0:4.3.2-43.ent
- php-devel-0:4.3.2-43.ent
- php-imap-0:4.3.2-43.ent
- php-ldap-0:4.3.2-43.ent
- php-mysql-0:4.3.2-43.ent
- php-odbc-0:4.3.2-43.ent
- php-pgsql-0:4.3.2-43.ent
- php-0:4.3.9-3.22.9
- php-0:5.1.6-15.el5
- php-bcmath-0:5.1.6-15.el5
- php-cli-0:5.1.6-15.el5
- php-common-0:5.1.6-15.el5
- php-dba-0:5.1.6-15.el5
- php-debuginfo-0:4.3.9-3.22.9
- php-debuginfo-0:5.1.6-15.el5
- php-devel-0:4.3.9-3.22.9
- php-devel-0:5.1.6-15.el5
- php-domxml-0:4.3.9-3.22.9
- php-gd-0:4.3.9-3.22.9
- php-gd-0:5.1.6-15.el5
- php-imap-0:4.3.9-3.22.9
- php-imap-0:5.1.6-15.el5
- php-ldap-0:4.3.9-3.22.9
- php-ldap-0:5.1.6-15.el5
- php-mbstring-0:4.3.9-3.22.9
- php-mbstring-0:5.1.6-15.el5
- php-mysql-0:4.3.9-3.22.9
- php-mysql-0:5.1.6-15.el5
- php-ncurses-0:4.3.9-3.22.9
- php-ncurses-0:5.1.6-15.el5
- php-odbc-0:4.3.9-3.22.9
- php-odbc-0:5.1.6-15.el5
- php-pdo-0:5.1.6-15.el5
- php-pear-0:4.3.9-3.22.9
- php-pgsql-0:4.3.9-3.22.9
- php-pgsql-0:5.1.6-15.el5
- php-snmp-0:4.3.9-3.22.9
- php-snmp-0:5.1.6-15.el5
- php-soap-0:5.1.6-15.el5
- php-xml-0:5.1.6-15.el5
- php-xmlrpc-0:4.3.9-3.22.9
- php-xmlrpc-0:5.1.6-15.el5
- php-0:5.1.6-3.el4s1.8
- php-bcmath-0:5.1.6-3.el4s1.8
- php-cli-0:5.1.6-3.el4s1.8
- php-common-0:5.1.6-3.el4s1.8
- php-dba-0:5.1.6-3.el4s1.8
- php-debuginfo-0:5.1.6-3.el4s1.8
- php-devel-0:5.1.6-3.el4s1.8
- php-gd-0:5.1.6-3.el4s1.8
- php-imap-0:5.1.6-3.el4s1.8
- php-ldap-0:5.1.6-3.el4s1.8
- php-mbstring-0:5.1.6-3.el4s1.8
- php-mysql-0:5.1.6-3.el4s1.8
- php-ncurses-0:5.1.6-3.el4s1.8
- php-odbc-0:5.1.6-3.el4s1.8
- php-pdo-0:5.1.6-3.el4s1.8
- php-pgsql-0:5.1.6-3.el4s1.8
- php-snmp-0:5.1.6-3.el4s1.8
- php-soap-0:5.1.6-3.el4s1.8
- php-xml-0:5.1.6-3.el4s1.8
- php-xmlrpc-0:5.1.6-3.el4s1.8
- gd-0:2.0.28-5.4E.el4_6.1
- gd-0:2.0.33-9.4.el5_1.1
- gd-debuginfo-0:2.0.28-5.4E.el4_6.1
- gd-debuginfo-0:2.0.33-9.4.el5_1.1
- gd-devel-0:2.0.28-5.4E.el4_6.1
- gd-devel-0:2.0.33-9.4.el5_1.1
- gd-progs-0:2.0.28-5.4E.el4_6.1
- gd-progs-0:2.0.33-9.4.el5_1.1
|
|
refmap
via4
|
bid | 24089 | confirm | | fedora | - FEDORA-2007-2215
- FEDORA-2007-709
| gentoo | - GLSA-200708-05
- GLSA-200710-02
- GLSA-200711-34
- GLSA-200805-13
| hp | | mandriva | - MDKSA-2007:122
- MDKSA-2007:123
- MDKSA-2007:124
- MDKSA-2007:187
| openpkg | OpenPKG-SA-2007.020 | osvdb | | sectrack | 1018187 | secunia | - 25353
- 25362
- 25378
- 25535
- 25575
- 25590
- 25646
- 25657
- 25658
- 25787
- 25855
- 26048
- 26231
- 26390
- 26871
- 26895
- 26930
- 26967
- 27037
- 27102
- 27110
- 27545
- 29157
- 30168
| slackware | SSA:2007-152-01 | suse | - SUSE-SA:2007:044
- SUSE-SR:2007:013
| trustix | | ubuntu | USN-473-1 | vupen | - ADV-2007-1904
- ADV-2007-1905
- ADV-2007-2016
- ADV-2007-2336
- ADV-2007-3386
| xf | gd-gdpngreaddata-dos(34420) |
|
statements
via4
|
contributor | Joshua Bressers | lastmodified | 2007-05-22 | organization | Red Hat | statement | Red Hat does not consider this flaw to be a security vulnerability. We are not aware of any long running processes using libgd which could not recover from this condition. |
|
Last major update |
11-10-2017 - 01:32 |
Published |
18-05-2007 - 18:30 |
Last modified |
11-10-2017 - 01:32 |