Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gd graphics library gdlib 1.8.4 |
||
gd graphics library gdlib 2.0.26 |
||
gd graphics library gdlib 2.0.27 |
||
gd graphics library gdlib 2.0.28 |
||
gd graphics library gdlib 2.0.1 |
||
gd graphics library gdlib 2.0.15 |
||
openpkg openpkg 2.1 |
||
openpkg openpkg 2.2 |
||
gd graphics library gdlib 2.0.20 |
||
gd graphics library gdlib 2.0.21 |
||
openpkg openpkg current |
||
gd graphics library gdlib 2.0.22 |
||
gd graphics library gdlib 2.0.23 |
||
suse suse linux 8.1 |
||
suse suse linux 8.2 |
||
trustix secure linux 2.1 |
||
trustix secure linux 2.2 |
||
suse suse linux 9.0 |
||
suse suse linux 9.1 |
||
suse suse linux 9.2 |
||
gentoo linux |
||
suse suse linux 8.0 |
||
trustix secure linux 1.5 |
||
trustix secure linux 2.0 |