5
CVSSv2

CVE-2007-3477

Published: 28/06/2007 Updated: 16/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) prior to 2.0.35 allow malicious users to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.

Vulnerable Product Search on Vulmon Subscribe to Product

libgd gd graphics library

libgd gd graphics library 2.0.35

libgd gd graphics library 2.0.33

libgd gd graphics library 2.0.34

Vendor Advisories

Tomas Hoger discovered that the GD library did not properly handle the number of colors in certain malformed GD images If a user or automated system were tricked into processing a specially crafted GD image, an attacker could cause a denial of service or possibly execute arbitrary code (CVE-2009-3546) ...
Multiple vulnerabilities have been identified in libgd2, a library for programmatic graphics creation and manipulation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2445 Grayscale PNG files containing invalid tRNS chunk CRC values could cause a denial of service (crash), if a maliciously ...
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2035 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value ...

References

CWE-399http://www.libgd.org/ReleaseNote020035http://bugs.libgd.org/?do=details&task_id=74http://bugs.libgd.org/?do=details&task_id=92ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzhttps://issues.rpath.com/browse/RPL-1643https://bugzilla.redhat.com/show_bug.cgi?id=277421http://fedoranews.org/updates/FEDORA-2007-205.shtmlhttp://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.htmlhttp://security.gentoo.org/glsa/glsa-200708-05.xmlhttp://security.gentoo.org/glsa/glsa-200711-34.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:153http://www.mandriva.com/security/advisories?name=MDKSA-2007:164http://www.novell.com/linux/security/advisories/2007_15_sr.htmlhttp://www.trustix.org/errata/2007/0024/http://www.securityfocus.com/bid/24651http://secunia.com/advisories/25860http://secunia.com/advisories/26272http://secunia.com/advisories/26390http://secunia.com/advisories/26415http://secunia.com/advisories/26467http://secunia.com/advisories/26663http://secunia.com/advisories/26766http://secunia.com/advisories/26856http://security.gentoo.org/glsa/glsa-200805-13.xmlhttp://secunia.com/advisories/30168http://www.debian.org/security/2008/dsa-1613http://secunia.com/advisories/31168http://secunia.com/advisories/42813http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.htmlhttp://www.vupen.com/english/advisories/2011/0022http://osvdb.org/42062http://www.securityfocus.com/archive/1/478796/100/0/threadedhttps://usn.ubuntu.com/854-1/https://nvd.nist.gov