Lucene search

K
ubuntuUbuntuUSN-473-1
HistoryJun 12, 2007 - 12:00 a.m.

libgd2 vulnerabilities

2007-06-1200:00:00
ubuntu.com
29

7.3 High

AI Score

Confidence

High

0.064 Low

EPSS

Percentile

93.7%

Releases

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Details

A buffer overflow was discovered in libgd2’s font renderer. By tricking
an application using libgd2 into rendering a specially crafted string
with a JIS encoded font, a remote attacker could read heap memory or
crash the application, leading to a denial of service. (CVE-2007-0455)

Xavier Roche discovered that libgd2 did not correctly validate PNG
callback results. If an application were tricked into processing a
specially crafted PNG image, it would monopolize CPU resources. Since
libgd2 is often used in PHP and Perl web applications, this could lead
to a remote denial of service. (CVE-2007-2756)

OSVersionArchitecturePackageVersionFilename
Ubuntu7.04noarchlibgd2-xpm< 2.0.34~rc1-2ubuntu1.1UNKNOWN
Ubuntu7.04noarchlibgd2-noxpm< 2.0.34~rc1-2ubuntu1.1UNKNOWN
Ubuntu6.10noarchlibgd2-xpm< 2.0.33-4ubuntu2.1UNKNOWN
Ubuntu6.10noarchlibgd2-noxpm< 2.0.33-4ubuntu2.1UNKNOWN
Ubuntu6.06noarchlibgd2-xpm< 2.0.33-2ubuntu5.2UNKNOWN
Ubuntu6.06noarchlibgd2-noxpm< 2.0.33-2ubuntu5.2UNKNOWN