Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-2756

Опубликовано: 16 мая 2007
Источник: redhat
EPSS Низкий

Описание

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates for libwmf in Red Hat Enterprise Linux 5 and 6. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4libwmfWill not fix
Red Hat Enterprise Linux 5libwmfWill not fix
Red Hat Enterprise Linux 6libwmfWill not fix
Red Hat Enterprise Linux 3phpFixedRHSA-2007:088926.09.2007
Red Hat Enterprise Linux 4phpFixedRHSA-2007:089020.09.2007
Red Hat Enterprise Linux 4gdFixedRHSA-2008:014628.02.2008
Red Hat Enterprise Linux 5phpFixedRHSA-2007:089020.09.2007
Red Hat Enterprise Linux 5gdFixedRHSA-2008:014628.02.2008
Red Hat Web Application Stack for RHEL 4phpFixedRHSA-2007:089125.10.2007

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=242033gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG

EPSS

Процентиль: 91%
0.07124
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

nvd
больше 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

debian
больше 18 лет назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attack ...

github
почти 4 года назад

The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.

oracle-oval
почти 18 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)

EPSS

Процентиль: 91%
0.07124
Низкий