Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-4484

Опубликовано: 16 июл. 2006
Источник: redhat
EPSS Низкий

Описание

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

Дополнительная информация

Статус:

Moderate

EPSS

Процентиль: 91%
0.06436
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

nvd
больше 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

debian
больше 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in ...

github
почти 4 года назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

oracle-oval
почти 18 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)

EPSS

Процентиль: 91%
0.06436
Низкий