First published: Tue Jan 30 2007(Updated: )
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GD Graphics Library | <=2.0.33 | |
PHP | >=4.4.0<4.4.7 | |
Ubuntu | =7.04 | |
Ubuntu | =6.10 | |
Ubuntu | =6.06 | |
Fedora | =13 | |
Fedora | =14 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Enterprise Linux Server | =4.0 | |
Red Hat Enterprise Linux Workstation | =4.0 | |
Red Hat Enterprise Linux Workstation | =3.0 | |
Red Hat Enterprise Linux Server | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0455 has a severity rating that indicates it can lead to denial of service and potential arbitrary code execution.
To fix CVE-2007-0455, upgrade to GD Graphics Library version 2.0.34 or later.
Systems running GD Graphics Library versions 2.0.33 and earlier, as well as specific versions of PHP and various Linux distributions are vulnerable to CVE-2007-0455.
CVE-2007-0455 enables remote attackers to craft strings that may trigger a buffer overflow, causing application crashes.
CVE-2007-0455 is primarily associated with the GD Graphics Library but can affect applications written in PHP that utilize this library.