Lucene search

K
centosCentOS ProjectCESA-2004:638
HistoryMay 27, 2005 - 1:29 p.m.

gd security update

2005-05-2713:29:15
CentOS Project
lists.centos.org
68

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.217 Low

EPSS

Percentile

96.4%

CentOS Errata and Security Advisory CESA-2004:638

The gd packages contain a graphics library used for the dynamic creation of
images such as PNG and JPEG.

Several buffer overflows were reported in various memory allocation calls.
An attacker could create a carefully crafted image file in such a way that
it could cause ImageMagick to execute arbitrary code when processing the
image. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0990 to these issues.

While researching the fixes to these overflows, additional buffer overflows
were discovered in calls to gdMalloc. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0941 to
these issues.

Users of gd should upgrade to these updated packages, which contain a
backported security patch, and are not vulnerable to these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-May/073929.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073930.html

Affected packages:
gd
gd-devel
gd-progs

Upstream details at:
https://access.redhat.com/errata/RHSA-2004:638

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.217 Low

EPSS

Percentile

96.4%