Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-2756

Опубликовано: 16 мая 2007
Источник: redhat

Описание

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates for libwmf in Red Hat Enterprise Linux 5 and 6. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4libwmfWill not fix
Red Hat Enterprise Linux 5libwmfWill not fix
Red Hat Enterprise Linux 6libwmfWill not fix
Red Hat Enterprise Linux 3phpFixedRHSA-2007:088926.09.2007
Red Hat Enterprise Linux 4phpFixedRHSA-2007:089020.09.2007
Red Hat Enterprise Linux 4gdFixedRHSA-2008:014628.02.2008
Red Hat Enterprise Linux 5phpFixedRHSA-2007:089020.09.2007
Red Hat Enterprise Linux 5gdFixedRHSA-2008:014628.02.2008
Red Hat Web Application Stack for RHEL 4phpFixedRHSA-2007:089125.10.2007

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=242033gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG

Связанные уязвимости

ubuntu
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

nvd
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

debian
около 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attack ...

github
около 3 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

oracle-oval
больше 17 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)