Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-4484

Опубликовано: 31 авг. 2006
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 2.6

Описание

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.9
devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

EPSS

Процентиль: 87%
0.03309
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

nvd
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

debian
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in ...

github
около 3 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

oracle-oval
больше 17 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)

EPSS

Процентиль: 87%
0.03309
Низкий

2.6 Low

CVSS2