Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2rm4-pxv9-x75c

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

Ссылки

EPSS

Процентиль: 91%
0.0646
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

redhat
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

nvd
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

debian
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attack ...

oracle-oval
больше 17 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)

EPSS

Процентиль: 91%
0.0646
Низкий