First published: Thu Jun 28 2007(Updated: )
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GD Graphics Library | =2.0.34-rc2 | |
GD Graphics Library | =2.0.33 | |
GD Graphics Library | =2.0.34-rc1 | |
GD Graphics Library | =2.0.35-rc3 | |
GD Graphics Library | =2.0.35-rc2 | |
GD Graphics Library | =2.0.35-rc1 | |
GD Graphics Library | <=2.0.35 | |
GD Graphics Library | =2.0.34 | |
GD Graphics Library | =2.0.35-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3472 is classified as having a potentially high severity due to its integer overflow vulnerability in the GD Graphics Library.
To fix CVE-2007-3472, you should upgrade to GD Graphics Library version 2.0.36 or later.
CVE-2007-3472 affects GD Graphics Library versions up to and including 2.0.35.
The impact of CVE-2007-3472 may allow user-assisted remote attackers to exploit the vulnerability through unspecified attack vectors.
CVE-2007-3472 remains a concern for systems using affected versions of the GD Graphics Library that have not been updated.