5.4
CVSSv2

CVE-2006-2906

Published: 08/06/2006 Updated: 03/10/2018
CVSS v2 Base Score: 5.4 | Impact Score: 6.9 | Exploitability Score: 4.9
VMScore: 545
Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Summary

The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote malicious users to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.

Vulnerable Product Search on Vulmon Subscribe to Product

thomas boutell graphics draw library 2.0.33

Vendor Advisories

Debian Bug report logs - #372912 libgd2: CVE-2006-2906: infinte lop via malformed gif Package: libgd2; Maintainer for libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Alec Berryman <alec@thenednet> Date: Mon, 12 Jun 2006 13:18:23 UTC Severity: important Tags: patch, pending, security Fixed in versions l ...
Xavier Roche discovered that libgd’s function for reading GIF image data did not sufficiently verify its validity Specially crafted GIF images could cause an infinite loop which used up all available CPU resources Since libgd is often used in PHP and Perl web applications, this could lead to a remote Denial of Service vulnerability ...
It was discovered that the GD graphics library performs insufficient checks of the validity of GIF images, which might lead to denial of service by tricking the application into an infinite loop For the stable distribution (sarge) this problem has been fixed in version 2033-11sarge1 For the unstable distribution (sid) this problem has been fix ...

Exploits

source: wwwsecurityfocuscom/bid/18294/info The GD Graphics Library is prone to a denial-of-service vulnerability Attackers can trigger an infinite-loop condition when the library tries to handle malformed image files This issue allows attackers to consume excessive CPU resources on computers that use the affected software This may den ...