First published: Thu Oct 28 2004(Updated: )
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gd Graphics Library Gdlib | =2.0.26 | |
Gd Graphics Library Gdlib | =2.0.15 | |
Openpkg Openpkg | =2.1 | |
Gd Graphics Library Gdlib | =2.0.22 | |
Openpkg Openpkg | =current | |
Gd Graphics Library Gdlib | =2.0.23 | |
Gd Graphics Library Gdlib | =2.0.27 | |
Gd Graphics Library Gdlib | =2.0.20 | |
Gd Graphics Library Gdlib | =1.8.4 | |
Openpkg Openpkg | =2.2 | |
Gd Graphics Library Gdlib | =2.0.1 | |
Gd Graphics Library Gdlib | =2.0.21 | |
Gd Graphics Library Gdlib | =2.0.28 | |
Trustix Secure Linux | =2.0 | |
Suse Suse Linux | =9.2 | |
Suse Suse Linux | =9.0 | |
Suse Suse Linux | =8.2 | |
Suse Suse Linux | =9.0 | |
Suse Suse Linux | =8.0 | |
Trustix Secure Linux | =1.5 | |
Suse Suse Linux | =9.1 | |
Trustix Secure Linux | =2.1 | |
Trustix Secure Linux | =2.2 | |
Gentoo Linux | ||
Suse Suse Linux | =8.1 | |
ubuntu/libgd | <1.8.4. | 1.8.4. |
ubuntu/libgd | <1.8.4. | 1.8.4. |
ubuntu/libgd | <1.8.4. | 1.8.4. |
ubuntu/libgd2 | <2.0.33-2ubuntu5.2 | 2.0.33-2ubuntu5.2 |
ubuntu/libgd2 | <2.0.33-4ubuntu2.1 | 2.0.33-4ubuntu2.1 |
ubuntu/libgd2 | <2.0.34~ | 2.0.34~ |
debian/libgd2 | 2.3.0-2 2.3.3-9 2.3.3-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.