First published: Sun Jul 16 2006(Updated: )
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gd | <0:2.0.28-5.4E.el4_6.1 | 0:2.0.28-5.4E.el4_6.1 |
redhat/gd | <0:2.0.33-9.4.el5_1.1 | 0:2.0.33-9.4.el5_1.1 |
redhat/php | <0:5.1.4-1.el4 | 0:5.1.4-1.el4 |
PHP | =5.1.2 | |
PHP | =5.1.1 | |
PHP | =5.1.4 | |
PHP | =5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2006-4484 is classified as a high severity vulnerability due to the risk of remote code execution from a crafted GIF file.
To fix CVE-2006-4484, upgrade your GD library and PHP to versions higher than 5.1.5.
CVE-2006-4484 affects PHP versions 5.1.0 to 5.1.4.
The vulnerability in CVE-2006-4484 is a buffer overflow in the LWZReadByte_ function when processing GIF files.
Yes, CVE-2006-4484 can be exploited remotely through maliciously crafted GIF files.