10
CVSSv2

CVE-2004-0990

Published: 01/03/2005 Updated: 11/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.

Vulnerable Product Search on Vulmon Subscribe to Product

gd graphics library gdlib 1.8.4

gd graphics library gdlib 2.0.26

gd graphics library gdlib 2.0.27

gd graphics library gdlib 2.0.28

gd graphics library gdlib 2.0.1

gd graphics library gdlib 2.0.15

openpkg openpkg 2.1

openpkg openpkg 2.2

gd graphics library gdlib 2.0.20

gd graphics library gdlib 2.0.21

openpkg openpkg current

gd graphics library gdlib 2.0.22

gd graphics library gdlib 2.0.23

suse suse linux 8.1

suse suse linux 8.2

trustix secure linux 2.1

trustix secure linux 2.2

suse suse linux 9.0

suse suse linux 9.1

suse suse linux 9.2

gentoo linux

suse suse linux 8.0

trustix secure linux 1.5

trustix secure linux 2.0

Vendor Advisories

Synopsis gd security update Type/Severity Security Advisory: Important Topic Updated gd packages that fix security issues with overflow in variousmemory allocation calls are now available[Updated 24 May 2005]Multilib packages have been added to this advisory Description The gd packages con ...
Several buffer overflows have been discovered in libgd’s PNG handling functions ...
Several buffer overflows have been discovered in libgd’s PNG handling functions ...
"infamous41md" discovered several integer overflows in the PNG image decoding routines of the GD graphics library This could lead to the execution of arbitrary code on the victim's machine For the stable distribution (woody) these problems have been fixed in version 184-17woody3 of libgd1 and in version 201-10woody1 of libgd2 For the unstab ...
More potential integer overflows have been found in the GD graphics library which weren't covered by our security advisory DSA 591 They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine For the stable distribution (woody) these problems have been fixed in version 201-10wo ...
More potential integer overflows have been found in the GD graphics library which weren't covered by our security advisory DSA 589 They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine For the stable distribution (woody) these problems have been fixed in version 184-17w ...

Exploits

#include <stdioh> #include <sys/typesh> #include <netinet/inh> #include <fcntlh> #include <stringh> #include <unistdh> #include <stdlibh> #include <stdinth> #include <zlibh> #define OUTFILE "britnay_spares_pr0npng" #define BS 0x1000 #define ALIGN 0 #define die(x) do{ perror((x)); exi ...