Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gdlib | Gd_graphics_library | 1.8.4 (including) | 1.8.4 (including) |
Gdlib | Gd_graphics_library | 2.0.1 (including) | 2.0.1 (including) |
Gdlib | Gd_graphics_library | 2.0.15 (including) | 2.0.15 (including) |
Gdlib | Gd_graphics_library | 2.0.20 (including) | 2.0.20 (including) |
Gdlib | Gd_graphics_library | 2.0.21 (including) | 2.0.21 (including) |
Gdlib | Gd_graphics_library | 2.0.22 (including) | 2.0.22 (including) |
Gdlib | Gd_graphics_library | 2.0.23 (including) | 2.0.23 (including) |
Gdlib | Gd_graphics_library | 2.0.26 (including) | 2.0.26 (including) |
Gdlib | Gd_graphics_library | 2.0.27 (including) | 2.0.27 (including) |
Gdlib | Gd_graphics_library | 2.0.28 (including) | 2.0.28 (including) |
Openpkg | Openpkg | 2.1 (including) | 2.1 (including) |
Openpkg | Openpkg | 2.2 (including) | 2.2 (including) |
Openpkg | Openpkg | current (including) | current (including) |
Red Hat Enterprise Linux 3 | RedHat | gd-0:1.8.4-12.3.1 | * |
Libgd | Ubuntu | dapper | * |
Libgd | Ubuntu | devel | * |
Libgd | Ubuntu | edgy | * |
Libgd | Ubuntu | feisty | * |
Libgd2 | Ubuntu | dapper | * |
Libgd2 | Ubuntu | devel | * |
Libgd2 | Ubuntu | edgy | * |
Libgd2 | Ubuntu | feisty | * |