Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2756

Опубликовано: 18 мая 2007
Источник: debian

Описание

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgd2fixed2.0.35.dfsg-1package
libgdno-dsaetchpackage
libgdno-dsasargepackage
libgd2no-dsaetchpackage
libgd2no-dsasargepackage

Примечания

  • https://web.archive.org/web/20090212193455/http://bugs.libgd.org/?do=details&task_id=86

Связанные уязвимости

ubuntu
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

redhat
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

nvd
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

github
около 3 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

oracle-oval
больше 17 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)