6.8
CVSSv2

CVE-2007-3996

Published: 04/09/2007 Updated: 29/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in libgd in PHP prior to 5.2.4 allow remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.

Vulnerable Product Search on Vulmon Subscribe to Product

php php

Vendor Advisories

Debian Bug report logs - #443456 CVE-2007-3996 integer overflows in multiple functions Package: libgd2; Maintainer for libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Nico Golde <nion@debianorg> Date: Fri, 21 Sep 2007 13:54:04 UTC Severity: important Tags: security Found in version 2033-11sarge1 Fix ...
Mattias Bengtsson and Philip Olausson discovered that the GD library did not properly perform bounds checking when creating images An attacker could send specially crafted input to applications linked against libgd2 and cause a denial of service or possibly execute arbitrary code ...
It was discovered that PHP did not properly enforce php_admin_value and php_admin_flag restrictions in the Apache configuration file A local attacker could create a specially crafted PHP script that would bypass intended security restrictions This issue only applied to Ubuntu 606 LTS, 710, and 804 LTS (CVE-2007-5900) ...
Multiple vulnerabilities have been identified in libgd2, a library for programmatic graphics creation and manipulation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2445 Grayscale PNG files containing invalid tRNS chunk CRC values could cause a denial of service (crash), if a maliciously ...

References

CWE-189http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/http://www.php.net/ChangeLog-5.php#5.2.4http://www.php.net/releases/5_2_4.phphttp://secunia.com/advisories/26642https://issues.rpath.com/browse/RPL-1702https://issues.rpath.com/browse/RPL-1693http://support.avaya.com/elmodocs2/security/ASA-2007-449.htmhttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200710-02.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:187http://www.redhat.com/support/errata/RHSA-2007-0890.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0889.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0888.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0891.htmlhttp://www.trustix.org/errata/2007/0026/http://secunia.com/advisories/26822http://secunia.com/advisories/26838http://secunia.com/advisories/26930http://secunia.com/advisories/26871http://secunia.com/advisories/26895http://secunia.com/advisories/26967http://secunia.com/advisories/27351http://secunia.com/advisories/27377http://secunia.com/advisories/27545http://secunia.com/advisories/27102http://securityreason.com/securityalert/3103http://bugs.gentoo.org/show_bug.cgi?id=201546http://security.gentoo.org/glsa/glsa-200712-13.xmlhttp://www.ubuntu.com/usn/usn-557-1http://secunia.com/advisories/28009http://secunia.com/advisories/28147http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.htmlhttp://secunia.com/advisories/28658http://www.debian.org/security/2008/dsa-1613http://secunia.com/advisories/31168http://www.vupen.com/english/advisories/2007/3023https://exchange.xforce.ibmcloud.com/vulnerabilities/36383https://exchange.xforce.ibmcloud.com/vulnerabilities/36382https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443456https://nvd.nist.govhttps://usn.ubuntu.com/557-1/