Vulnerabilites related to libgd - gd_graphics_library
cve-2009-3546
Vulnerability from cvelistv5
Published
2009-10-19 19:27
Modified
2024-08-07 06:31
Severity ?
Summary
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.
References
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/37069third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0003.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/37080third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/36712vdb-entry, x_refsource_BID
http://secunia.com/advisories/38055third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/2929vdb-entry, x_refsource_VUPEN
http://marc.info/?l=oss-security&m=125562113503923&w=2mailing-list, x_refsource_MLIST
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199vdb-entry, signature, x_refsource_OVAL
http://svn.php.net/viewvc?view=revision&revision=289557x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2009/11/20/5mailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2009/2930vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:31:10.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2009:285",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:285"
          },
          {
            "name": "37069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37069"
          },
          {
            "name": "RHSA-2010:0003",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0003.html"
          },
          {
            "name": "37080",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37080"
          },
          {
            "name": "36712",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36712"
          },
          {
            "name": "38055",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38055"
          },
          {
            "name": "ADV-2009-2929",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2929"
          },
          {
            "name": "[oss-security] 20091015 Re: CVE Request -- PHP 5 - 5.2.11",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=125562113503923\u0026w=2"
          },
          {
            "name": "oval:org.mitre.oval:def:11199",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.php.net/viewvc?view=revision\u0026revision=289557"
          },
          {
            "name": "[oss-security] 20091120 Re: CVE request: php 5.3.1 update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/11/20/5"
          },
          {
            "name": "ADV-2009-2930",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2930"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDVSA-2009:285",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:285"
        },
        {
          "name": "37069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37069"
        },
        {
          "name": "RHSA-2010:0003",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0003.html"
        },
        {
          "name": "37080",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37080"
        },
        {
          "name": "36712",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36712"
        },
        {
          "name": "38055",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38055"
        },
        {
          "name": "ADV-2009-2929",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2929"
        },
        {
          "name": "[oss-security] 20091015 Re: CVE Request -- PHP 5 - 5.2.11",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=125562113503923\u0026w=2"
        },
        {
          "name": "oval:org.mitre.oval:def:11199",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.php.net/viewvc?view=revision\u0026revision=289557"
        },
        {
          "name": "[oss-security] 20091120 Re: CVE request: php 5.3.1 update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/11/20/5"
        },
        {
          "name": "ADV-2009-2930",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2930"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-3546",
    "datePublished": "2009-10-19T19:27:00",
    "dateReserved": "2009-10-05T00:00:00",
    "dateUpdated": "2024-08-07T06:31:10.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3472
Vulnerability from cvelistv5
Published
2007-06-28 18:00
Modified
2024-08-07 14:21
Severity ?
Summary
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
References
http://www.trustix.org/errata/2007/0024/vendor-advisory, x_refsource_TRUSTIX
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/29157third-party-advisory, x_refsource_SECUNIA
http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/x_refsource_MISC
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/26415third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1643x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=277421x_refsource_CONFIRM
http://osvdb.org/37745vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/25855third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200805-13.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/archive/1/478796/100/0/threadedmailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/35108vdb-entry, x_refsource_XF
http://secunia.com/advisories/26467third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/42813third-party-advisory, x_refsource_SECUNIA
http://www.libgd.org/ReleaseNote020035x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200708-05.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/30168third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0022vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/25860third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2336vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26663third-party-advisory, x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/26856third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26272third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200711-34.xmlvendor-advisory, x_refsource_GENTOO
http://www.redhat.com/support/errata/RHSA-2008-0146.htmlvendor-advisory, x_refsource_REDHAT
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/24651vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153vendor-advisory, x_refsource_MANDRIVA
http://bugs.libgd.org/?do=details&task_id=89x_refsource_MISC
http://secunia.com/advisories/26766third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26390third-party-advisory, x_refsource_SECUNIA
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzx_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2007_15_sr.htmlvendor-advisory, x_refsource_SUSE
http://fedoranews.org/updates/FEDORA-2007-205.shtmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:35.494Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2007-0024",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0024/"
          },
          {
            "name": "MDKSA-2007:164",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
          },
          {
            "name": "29157",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29157"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"
          },
          {
            "name": "oval:org.mitre.oval:def:11067",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"
          },
          {
            "name": "26415",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1643"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
          },
          {
            "name": "37745",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37745"
          },
          {
            "name": "25855",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25855"
          },
          {
            "name": "GLSA-200805-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
          },
          {
            "name": "20070907 FLEA-2007-0052-1 gd",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
          },
          {
            "name": "gd-imagecreatetruecolor-code-execution(35108)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"
          },
          {
            "name": "26467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26467"
          },
          {
            "name": "42813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42813"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.libgd.org/ReleaseNote020035"
          },
          {
            "name": "GLSA-200708-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
          },
          {
            "name": "30168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30168"
          },
          {
            "name": "FEDORA-2007-692",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
          },
          {
            "name": "ADV-2011-0022",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0022"
          },
          {
            "name": "25860",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25860"
          },
          {
            "name": "ADV-2007-2336",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2336"
          },
          {
            "name": "26663",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26663"
          },
          {
            "name": "FEDORA-2010-19033",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
          },
          {
            "name": "26856",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26856"
          },
          {
            "name": "26272",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26272"
          },
          {
            "name": "GLSA-200711-34",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
          },
          {
            "name": "RHSA-2008:0146",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
          },
          {
            "name": "FEDORA-2010-19022",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
          },
          {
            "name": "24651",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24651"
          },
          {
            "name": "MDKSA-2007:153",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.libgd.org/?do=details\u0026task_id=89"
          },
          {
            "name": "26766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26766"
          },
          {
            "name": "26390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26390"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
          },
          {
            "name": "SUSE-SR:2007:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
          },
          {
            "name": "FEDORA-2007-2055",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2007-0024",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0024/"
        },
        {
          "name": "MDKSA-2007:164",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
        },
        {
          "name": "29157",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29157"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"
        },
        {
          "name": "oval:org.mitre.oval:def:11067",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"
        },
        {
          "name": "26415",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1643"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
        },
        {
          "name": "37745",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37745"
        },
        {
          "name": "25855",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25855"
        },
        {
          "name": "GLSA-200805-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
        },
        {
          "name": "20070907 FLEA-2007-0052-1 gd",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
        },
        {
          "name": "gd-imagecreatetruecolor-code-execution(35108)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"
        },
        {
          "name": "26467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26467"
        },
        {
          "name": "42813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42813"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.libgd.org/ReleaseNote020035"
        },
        {
          "name": "GLSA-200708-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
        },
        {
          "name": "30168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30168"
        },
        {
          "name": "FEDORA-2007-692",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
        },
        {
          "name": "ADV-2011-0022",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0022"
        },
        {
          "name": "25860",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25860"
        },
        {
          "name": "ADV-2007-2336",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2336"
        },
        {
          "name": "26663",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26663"
        },
        {
          "name": "FEDORA-2010-19033",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
        },
        {
          "name": "26856",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26856"
        },
        {
          "name": "26272",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26272"
        },
        {
          "name": "GLSA-200711-34",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
        },
        {
          "name": "RHSA-2008:0146",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
        },
        {
          "name": "FEDORA-2010-19022",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
        },
        {
          "name": "24651",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24651"
        },
        {
          "name": "MDKSA-2007:153",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.libgd.org/?do=details\u0026task_id=89"
        },
        {
          "name": "26766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26766"
        },
        {
          "name": "26390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26390"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
        },
        {
          "name": "SUSE-SR:2007:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
        },
        {
          "name": "FEDORA-2007-2055",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3472",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2007-0024",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0024/"
            },
            {
              "name": "MDKSA-2007:164",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
            },
            {
              "name": "29157",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29157"
            },
            {
              "name": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/",
              "refsource": "MISC",
              "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"
            },
            {
              "name": "oval:org.mitre.oval:def:11067",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"
            },
            {
              "name": "26415",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26415"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1643",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1643"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
            },
            {
              "name": "37745",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37745"
            },
            {
              "name": "25855",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25855"
            },
            {
              "name": "GLSA-200805-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
            },
            {
              "name": "20070907 FLEA-2007-0052-1 gd",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
            },
            {
              "name": "gd-imagecreatetruecolor-code-execution(35108)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"
            },
            {
              "name": "26467",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26467"
            },
            {
              "name": "42813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42813"
            },
            {
              "name": "http://www.libgd.org/ReleaseNote020035",
              "refsource": "CONFIRM",
              "url": "http://www.libgd.org/ReleaseNote020035"
            },
            {
              "name": "GLSA-200708-05",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
            },
            {
              "name": "30168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30168"
            },
            {
              "name": "FEDORA-2007-692",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
            },
            {
              "name": "ADV-2011-0022",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0022"
            },
            {
              "name": "25860",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25860"
            },
            {
              "name": "ADV-2007-2336",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2336"
            },
            {
              "name": "26663",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26663"
            },
            {
              "name": "FEDORA-2010-19033",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
            },
            {
              "name": "26856",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26856"
            },
            {
              "name": "26272",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26272"
            },
            {
              "name": "GLSA-200711-34",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
            },
            {
              "name": "RHSA-2008:0146",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
            },
            {
              "name": "FEDORA-2010-19022",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
            },
            {
              "name": "24651",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24651"
            },
            {
              "name": "MDKSA-2007:153",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
            },
            {
              "name": "http://bugs.libgd.org/?do=details\u0026task_id=89",
              "refsource": "MISC",
              "url": "http://bugs.libgd.org/?do=details\u0026task_id=89"
            },
            {
              "name": "26766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26766"
            },
            {
              "name": "26390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26390"
            },
            {
              "name": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
            },
            {
              "name": "SUSE-SR:2007:015",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
            },
            {
              "name": "FEDORA-2007-2055",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3472",
    "datePublished": "2007-06-28T18:00:00",
    "dateReserved": "2007-06-28T00:00:00",
    "dateUpdated": "2024-08-07T14:21:35.494Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3473
Vulnerability from cvelistv5
Published
2007-06-28 18:00
Modified
2024-08-07 14:21
Severity ?
Summary
The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/35109vdb-entry, x_refsource_XF
http://www.trustix.org/errata/2007/0024/vendor-advisory, x_refsource_TRUSTIX
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/29157third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/37744vdb-entry, x_refsource_OSVDB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/26415third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1643x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=277421x_refsource_CONFIRM
http://secunia.com/advisories/25855third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200805-13.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/archive/1/478796/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/26467third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/42813third-party-advisory, x_refsource_SECUNIA
http://www.libgd.org/ReleaseNote020035x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200708-05.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/30168third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0022vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/25860third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2336vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26663third-party-advisory, x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/26856third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26272third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200711-34.xmlvendor-advisory, x_refsource_GENTOO
http://www.redhat.com/support/errata/RHSA-2008-0146.htmlvendor-advisory, x_refsource_REDHAT
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.htmlvendor-advisory, x_refsource_FEDORA
http://bugs.libgd.org/?do=details&task_id=94x_refsource_MISC
http://www.securityfocus.com/bid/24651vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/26766third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26390third-party-advisory, x_refsource_SECUNIA
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzx_refsource_CONFIRM
http://fedoranews.org/updates/FEDORA-2007-205.shtmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:35.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "gd-imagecreatexbm-dos(35109)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"
          },
          {
            "name": "2007-0024",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0024/"
          },
          {
            "name": "MDKSA-2007:164",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
          },
          {
            "name": "29157",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29157"
          },
          {
            "name": "37744",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37744"
          },
          {
            "name": "oval:org.mitre.oval:def:11806",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"
          },
          {
            "name": "26415",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1643"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
          },
          {
            "name": "25855",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25855"
          },
          {
            "name": "GLSA-200805-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
          },
          {
            "name": "20070907 FLEA-2007-0052-1 gd",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
          },
          {
            "name": "26467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26467"
          },
          {
            "name": "42813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42813"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.libgd.org/ReleaseNote020035"
          },
          {
            "name": "GLSA-200708-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
          },
          {
            "name": "30168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30168"
          },
          {
            "name": "FEDORA-2007-692",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
          },
          {
            "name": "ADV-2011-0022",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0022"
          },
          {
            "name": "25860",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25860"
          },
          {
            "name": "ADV-2007-2336",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2336"
          },
          {
            "name": "26663",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26663"
          },
          {
            "name": "FEDORA-2010-19033",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
          },
          {
            "name": "26856",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26856"
          },
          {
            "name": "26272",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26272"
          },
          {
            "name": "GLSA-200711-34",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
          },
          {
            "name": "RHSA-2008:0146",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
          },
          {
            "name": "FEDORA-2010-19022",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.libgd.org/?do=details\u0026task_id=94"
          },
          {
            "name": "24651",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24651"
          },
          {
            "name": "MDKSA-2007:153",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
          },
          {
            "name": "26766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26766"
          },
          {
            "name": "26390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26390"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
          },
          {
            "name": "FEDORA-2007-2055",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "gd-imagecreatexbm-dos(35109)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"
        },
        {
          "name": "2007-0024",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0024/"
        },
        {
          "name": "MDKSA-2007:164",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
        },
        {
          "name": "29157",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29157"
        },
        {
          "name": "37744",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37744"
        },
        {
          "name": "oval:org.mitre.oval:def:11806",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"
        },
        {
          "name": "26415",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1643"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
        },
        {
          "name": "25855",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25855"
        },
        {
          "name": "GLSA-200805-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
        },
        {
          "name": "20070907 FLEA-2007-0052-1 gd",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
        },
        {
          "name": "26467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26467"
        },
        {
          "name": "42813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42813"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.libgd.org/ReleaseNote020035"
        },
        {
          "name": "GLSA-200708-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
        },
        {
          "name": "30168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30168"
        },
        {
          "name": "FEDORA-2007-692",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
        },
        {
          "name": "ADV-2011-0022",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0022"
        },
        {
          "name": "25860",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25860"
        },
        {
          "name": "ADV-2007-2336",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2336"
        },
        {
          "name": "26663",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26663"
        },
        {
          "name": "FEDORA-2010-19033",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
        },
        {
          "name": "26856",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26856"
        },
        {
          "name": "26272",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26272"
        },
        {
          "name": "GLSA-200711-34",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
        },
        {
          "name": "RHSA-2008:0146",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
        },
        {
          "name": "FEDORA-2010-19022",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.libgd.org/?do=details\u0026task_id=94"
        },
        {
          "name": "24651",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24651"
        },
        {
          "name": "MDKSA-2007:153",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
        },
        {
          "name": "26766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26766"
        },
        {
          "name": "26390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26390"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
        },
        {
          "name": "FEDORA-2007-2055",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3473",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "gd-imagecreatexbm-dos(35109)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"
            },
            {
              "name": "2007-0024",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0024/"
            },
            {
              "name": "MDKSA-2007:164",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
            },
            {
              "name": "29157",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29157"
            },
            {
              "name": "37744",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37744"
            },
            {
              "name": "oval:org.mitre.oval:def:11806",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"
            },
            {
              "name": "26415",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26415"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1643",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1643"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
            },
            {
              "name": "25855",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25855"
            },
            {
              "name": "GLSA-200805-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
            },
            {
              "name": "20070907 FLEA-2007-0052-1 gd",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
            },
            {
              "name": "26467",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26467"
            },
            {
              "name": "42813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42813"
            },
            {
              "name": "http://www.libgd.org/ReleaseNote020035",
              "refsource": "CONFIRM",
              "url": "http://www.libgd.org/ReleaseNote020035"
            },
            {
              "name": "GLSA-200708-05",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
            },
            {
              "name": "30168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30168"
            },
            {
              "name": "FEDORA-2007-692",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
            },
            {
              "name": "ADV-2011-0022",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0022"
            },
            {
              "name": "25860",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25860"
            },
            {
              "name": "ADV-2007-2336",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2336"
            },
            {
              "name": "26663",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26663"
            },
            {
              "name": "FEDORA-2010-19033",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
            },
            {
              "name": "26856",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26856"
            },
            {
              "name": "26272",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26272"
            },
            {
              "name": "GLSA-200711-34",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
            },
            {
              "name": "RHSA-2008:0146",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
            },
            {
              "name": "FEDORA-2010-19022",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
            },
            {
              "name": "http://bugs.libgd.org/?do=details\u0026task_id=94",
              "refsource": "MISC",
              "url": "http://bugs.libgd.org/?do=details\u0026task_id=94"
            },
            {
              "name": "24651",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24651"
            },
            {
              "name": "MDKSA-2007:153",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
            },
            {
              "name": "26766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26766"
            },
            {
              "name": "26390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26390"
            },
            {
              "name": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
            },
            {
              "name": "FEDORA-2007-2055",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3473",
    "datePublished": "2007-06-28T18:00:00",
    "dateReserved": "2007-06-28T00:00:00",
    "dateUpdated": "2024-08-07T14:21:35.682Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3474
Vulnerability from cvelistv5
Published
2007-06-28 18:00
Modified
2024-08-07 14:21
Severity ?
Summary
Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors.
References
http://www.trustix.org/errata/2007/0024/vendor-advisory, x_refsource_TRUSTIX
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/26415third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1643x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=277421x_refsource_CONFIRM
http://secunia.com/advisories/25855third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/35110vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200805-13.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/archive/1/478796/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/26467third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/42813third-party-advisory, x_refsource_SECUNIA
http://www.libgd.org/ReleaseNote020035x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200708-05.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/30168third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0022vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/25860third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2336vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26663third-party-advisory, x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.htmlvendor-advisory, x_refsource_FEDORA
http://osvdb.org/37743vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/26856third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26272third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200711-34.xmlvendor-advisory, x_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/24651vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/26766third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26390third-party-advisory, x_refsource_SECUNIA
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzx_refsource_CONFIRM
http://fedoranews.org/updates/FEDORA-2007-205.shtmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:35.593Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2007-0024",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0024/"
          },
          {
            "name": "MDKSA-2007:164",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
          },
          {
            "name": "26415",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1643"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
          },
          {
            "name": "25855",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25855"
          },
          {
            "name": "gd-gifreader-unspecified(35110)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35110"
          },
          {
            "name": "GLSA-200805-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
          },
          {
            "name": "20070907 FLEA-2007-0052-1 gd",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
          },
          {
            "name": "26467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26467"
          },
          {
            "name": "42813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42813"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.libgd.org/ReleaseNote020035"
          },
          {
            "name": "GLSA-200708-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
          },
          {
            "name": "30168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30168"
          },
          {
            "name": "FEDORA-2007-692",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
          },
          {
            "name": "ADV-2011-0022",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0022"
          },
          {
            "name": "25860",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25860"
          },
          {
            "name": "ADV-2007-2336",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2336"
          },
          {
            "name": "26663",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26663"
          },
          {
            "name": "FEDORA-2010-19033",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
          },
          {
            "name": "37743",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37743"
          },
          {
            "name": "26856",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26856"
          },
          {
            "name": "26272",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26272"
          },
          {
            "name": "GLSA-200711-34",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
          },
          {
            "name": "FEDORA-2010-19022",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
          },
          {
            "name": "24651",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24651"
          },
          {
            "name": "MDKSA-2007:153",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
          },
          {
            "name": "26766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26766"
          },
          {
            "name": "26390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26390"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
          },
          {
            "name": "FEDORA-2007-2055",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2007-0024",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0024/"
        },
        {
          "name": "MDKSA-2007:164",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
        },
        {
          "name": "26415",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1643"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
        },
        {
          "name": "25855",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25855"
        },
        {
          "name": "gd-gifreader-unspecified(35110)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35110"
        },
        {
          "name": "GLSA-200805-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
        },
        {
          "name": "20070907 FLEA-2007-0052-1 gd",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
        },
        {
          "name": "26467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26467"
        },
        {
          "name": "42813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42813"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.libgd.org/ReleaseNote020035"
        },
        {
          "name": "GLSA-200708-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
        },
        {
          "name": "30168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30168"
        },
        {
          "name": "FEDORA-2007-692",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
        },
        {
          "name": "ADV-2011-0022",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0022"
        },
        {
          "name": "25860",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25860"
        },
        {
          "name": "ADV-2007-2336",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2336"
        },
        {
          "name": "26663",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26663"
        },
        {
          "name": "FEDORA-2010-19033",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
        },
        {
          "name": "37743",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37743"
        },
        {
          "name": "26856",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26856"
        },
        {
          "name": "26272",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26272"
        },
        {
          "name": "GLSA-200711-34",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
        },
        {
          "name": "FEDORA-2010-19022",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
        },
        {
          "name": "24651",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24651"
        },
        {
          "name": "MDKSA-2007:153",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
        },
        {
          "name": "26766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26766"
        },
        {
          "name": "26390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26390"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
        },
        {
          "name": "FEDORA-2007-2055",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2007-0024",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0024/"
            },
            {
              "name": "MDKSA-2007:164",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
            },
            {
              "name": "26415",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26415"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1643",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1643"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
            },
            {
              "name": "25855",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25855"
            },
            {
              "name": "gd-gifreader-unspecified(35110)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35110"
            },
            {
              "name": "GLSA-200805-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
            },
            {
              "name": "20070907 FLEA-2007-0052-1 gd",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
            },
            {
              "name": "26467",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26467"
            },
            {
              "name": "42813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42813"
            },
            {
              "name": "http://www.libgd.org/ReleaseNote020035",
              "refsource": "CONFIRM",
              "url": "http://www.libgd.org/ReleaseNote020035"
            },
            {
              "name": "GLSA-200708-05",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
            },
            {
              "name": "30168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30168"
            },
            {
              "name": "FEDORA-2007-692",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
            },
            {
              "name": "ADV-2011-0022",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0022"
            },
            {
              "name": "25860",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25860"
            },
            {
              "name": "ADV-2007-2336",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2336"
            },
            {
              "name": "26663",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26663"
            },
            {
              "name": "FEDORA-2010-19033",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
            },
            {
              "name": "37743",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37743"
            },
            {
              "name": "26856",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26856"
            },
            {
              "name": "26272",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26272"
            },
            {
              "name": "GLSA-200711-34",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
            },
            {
              "name": "FEDORA-2010-19022",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
            },
            {
              "name": "24651",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24651"
            },
            {
              "name": "MDKSA-2007:153",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
            },
            {
              "name": "26766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26766"
            },
            {
              "name": "26390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26390"
            },
            {
              "name": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
            },
            {
              "name": "FEDORA-2007-2055",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3474",
    "datePublished": "2007-06-28T18:00:00",
    "dateReserved": "2007-06-28T00:00:00",
    "dateUpdated": "2024-08-07T14:21:35.593Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3477
Vulnerability from cvelistv5
Published
2007-06-28 18:00
Modified
2024-08-07 14:21
Severity ?
Summary
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.
References
http://www.trustix.org/errata/2007/0024/vendor-advisory, x_refsource_TRUSTIX
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1613vendor-advisory, x_refsource_DEBIAN
http://www.libgd.org/ReleaseNote020035x_refsource_MISC
http://secunia.com/advisories/26415third-party-advisory, x_refsource_SECUNIA
https://issues.rpath.com/browse/RPL-1643x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=277421x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200805-13.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/archive/1/478796/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/26467third-party-advisory, x_refsource_SECUNIA
http://bugs.libgd.org/?do=details&task_id=92x_refsource_CONFIRM
http://secunia.com/advisories/31168third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/42813third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200708-05.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/30168third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0022vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/25860third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26663third-party-advisory, x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/26856third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26272third-party-advisory, x_refsource_SECUNIA
http://bugs.libgd.org/?do=details&task_id=74x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200711-34.xmlvendor-advisory, x_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/24651vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDKSA-2007:153vendor-advisory, x_refsource_MANDRIVA
http://osvdb.org/42062vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/26766third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26390third-party-advisory, x_refsource_SECUNIA
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzx_refsource_CONFIRM
http://www.novell.com/linux/security/advisories/2007_15_sr.htmlvendor-advisory, x_refsource_SUSE
http://fedoranews.org/updates/FEDORA-2007-205.shtmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:34.911Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2007-0024",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0024/"
          },
          {
            "name": "MDKSA-2007:164",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
          },
          {
            "name": "DSA-1613",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1613"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.libgd.org/ReleaseNote020035"
          },
          {
            "name": "26415",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-1643"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
          },
          {
            "name": "GLSA-200805-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
          },
          {
            "name": "20070907 FLEA-2007-0052-1 gd",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
          },
          {
            "name": "26467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26467"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.libgd.org/?do=details\u0026task_id=92"
          },
          {
            "name": "31168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31168"
          },
          {
            "name": "42813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42813"
          },
          {
            "name": "GLSA-200708-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
          },
          {
            "name": "30168",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30168"
          },
          {
            "name": "FEDORA-2007-692",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
          },
          {
            "name": "ADV-2011-0022",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0022"
          },
          {
            "name": "25860",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25860"
          },
          {
            "name": "26663",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26663"
          },
          {
            "name": "FEDORA-2010-19033",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
          },
          {
            "name": "26856",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26856"
          },
          {
            "name": "26272",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26272"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.libgd.org/?do=details\u0026task_id=74"
          },
          {
            "name": "GLSA-200711-34",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
          },
          {
            "name": "FEDORA-2010-19022",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
          },
          {
            "name": "24651",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24651"
          },
          {
            "name": "MDKSA-2007:153",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
          },
          {
            "name": "42062",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42062"
          },
          {
            "name": "26766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26766"
          },
          {
            "name": "26390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26390"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
          },
          {
            "name": "SUSE-SR:2007:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
          },
          {
            "name": "FEDORA-2007-2055",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2007-0024",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0024/"
        },
        {
          "name": "MDKSA-2007:164",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
        },
        {
          "name": "DSA-1613",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1613"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.libgd.org/ReleaseNote020035"
        },
        {
          "name": "26415",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-1643"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
        },
        {
          "name": "GLSA-200805-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
        },
        {
          "name": "20070907 FLEA-2007-0052-1 gd",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
        },
        {
          "name": "26467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26467"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.libgd.org/?do=details\u0026task_id=92"
        },
        {
          "name": "31168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31168"
        },
        {
          "name": "42813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42813"
        },
        {
          "name": "GLSA-200708-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
        },
        {
          "name": "30168",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30168"
        },
        {
          "name": "FEDORA-2007-692",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
        },
        {
          "name": "ADV-2011-0022",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0022"
        },
        {
          "name": "25860",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25860"
        },
        {
          "name": "26663",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26663"
        },
        {
          "name": "FEDORA-2010-19033",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
        },
        {
          "name": "26856",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26856"
        },
        {
          "name": "26272",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26272"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.libgd.org/?do=details\u0026task_id=74"
        },
        {
          "name": "GLSA-200711-34",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
        },
        {
          "name": "FEDORA-2010-19022",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
        },
        {
          "name": "24651",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24651"
        },
        {
          "name": "MDKSA-2007:153",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
        },
        {
          "name": "42062",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42062"
        },
        {
          "name": "26766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26766"
        },
        {
          "name": "26390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26390"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
        },
        {
          "name": "SUSE-SR:2007:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
        },
        {
          "name": "FEDORA-2007-2055",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3477",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2007-0024",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0024/"
            },
            {
              "name": "MDKSA-2007:164",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
            },
            {
              "name": "DSA-1613",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1613"
            },
            {
              "name": "http://www.libgd.org/ReleaseNote020035",
              "refsource": "MISC",
              "url": "http://www.libgd.org/ReleaseNote020035"
            },
            {
              "name": "26415",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26415"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-1643",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-1643"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
            },
            {
              "name": "GLSA-200805-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
            },
            {
              "name": "20070907 FLEA-2007-0052-1 gd",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
            },
            {
              "name": "26467",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26467"
            },
            {
              "name": "http://bugs.libgd.org/?do=details\u0026task_id=92",
              "refsource": "CONFIRM",
              "url": "http://bugs.libgd.org/?do=details\u0026task_id=92"
            },
            {
              "name": "31168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31168"
            },
            {
              "name": "42813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42813"
            },
            {
              "name": "GLSA-200708-05",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
            },
            {
              "name": "30168",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30168"
            },
            {
              "name": "FEDORA-2007-692",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
            },
            {
              "name": "ADV-2011-0022",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0022"
            },
            {
              "name": "25860",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25860"
            },
            {
              "name": "26663",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26663"
            },
            {
              "name": "FEDORA-2010-19033",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
            },
            {
              "name": "26856",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26856"
            },
            {
              "name": "26272",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26272"
            },
            {
              "name": "http://bugs.libgd.org/?do=details\u0026task_id=74",
              "refsource": "CONFIRM",
              "url": "http://bugs.libgd.org/?do=details\u0026task_id=74"
            },
            {
              "name": "GLSA-200711-34",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
            },
            {
              "name": "FEDORA-2010-19022",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
            },
            {
              "name": "24651",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24651"
            },
            {
              "name": "MDKSA-2007:153",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
            },
            {
              "name": "42062",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42062"
            },
            {
              "name": "26766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26766"
            },
            {
              "name": "26390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26390"
            },
            {
              "name": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
            },
            {
              "name": "SUSE-SR:2007:015",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
            },
            {
              "name": "FEDORA-2007-2055",
              "refsource": "FEDORA",
              "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3477",
    "datePublished": "2007-06-28T18:00:00",
    "dateReserved": "2007-06-28T00:00:00",
    "dateUpdated": "2024-08-07T14:21:34.911Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2007-06-28 18:30
Modified
2024-11-21 00:33
Severity ?
Summary
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
References
cve@mitre.orgftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
cve@mitre.orghttp://bugs.libgd.org/?do=details&task_id=89
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2007-205.shtml
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
cve@mitre.orghttp://osvdb.org/37745
cve@mitre.orghttp://secunia.com/advisories/25855Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25860Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26272Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26390Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26415Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26467Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26663Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26766Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26856Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29157Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30168Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42813Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200708-05.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-34.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200805-13.xml
cve@mitre.orghttp://www.libgd.org/ReleaseNote020035
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:153
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:164
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_15_sr.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0146.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/478796/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24651
cve@mitre.orghttp://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
cve@mitre.orghttp://www.trustix.org/errata/2007/0024/
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2336Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0022Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=277421
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35108
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1643
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
af854a3a-2127-422b-91ae-364da2661108http://bugs.libgd.org/?do=details&task_id=89
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-205.shtml
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37745
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25855Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25860Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26272Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26390Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26415Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26663Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26766Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26856Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29157Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200708-05.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-34.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.libgd.org/ReleaseNote020035
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_15_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0146.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/478796/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24651
af854a3a-2127-422b-91ae-364da2661108http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0024/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2336Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0022Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=277421
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35108
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1643
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "1D5B16D2-156E-4FFE-AB40-A7DA40FD1BAF",
              "versionEndIncluding": "2.0.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DED10C-5B2F-41A8-887F-E53C9498D620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B236A476-9FB9-46A0-859A-86B6B37F6960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B5C6F71F-A65F-4AEF-B846-BDBF8C1965A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FB25E18F-7078-458C-B517-D7DCC942BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B928D03E-BABF-4FFB-B068-63A763301D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "345F2194-D009-45A8-8606-F2DAEC328A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FFB324F6-6271-412C-90D3-B91489200C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "0AC18015-92F0-458A-B27D-BA96645A0FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento enteros en la funci\u00f3n gdImageCreateTrueColor en GD Graphics Library (libgd) anterior a versi\u00f3n 2.0.35 permite a los atacantes remotos asistidos por el usuario tener vectores de ataque no especificados y un impacto."
    }
  ],
  "evaluatorImpact": "An integer overflow exists in the \"gdImageCreateTrueColor()\" function.\r\n",
  "id": "CVE-2007-3472",
  "lastModified": "2024-11-21T00:33:19.550",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-06-28T18:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=89"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37745"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25855"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29157"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2336"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=89"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3472\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.",
      "lastModified": "2007-09-05T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-06-28 18:30
Modified
2024-11-21 00:33
Severity ?
Summary
The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure.
References
cve@mitre.orgftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
cve@mitre.orghttp://bugs.libgd.org/?do=details&task_id=94
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2007-205.shtml
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
cve@mitre.orghttp://osvdb.org/37744
cve@mitre.orghttp://secunia.com/advisories/25855Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25860
cve@mitre.orghttp://secunia.com/advisories/26272
cve@mitre.orghttp://secunia.com/advisories/26390
cve@mitre.orghttp://secunia.com/advisories/26415
cve@mitre.orghttp://secunia.com/advisories/26467
cve@mitre.orghttp://secunia.com/advisories/26663
cve@mitre.orghttp://secunia.com/advisories/26766
cve@mitre.orghttp://secunia.com/advisories/26856
cve@mitre.orghttp://secunia.com/advisories/29157
cve@mitre.orghttp://secunia.com/advisories/30168
cve@mitre.orghttp://secunia.com/advisories/42813
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200708-05.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-34.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200805-13.xml
cve@mitre.orghttp://www.libgd.org/ReleaseNote020035
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:153
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:164
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0146.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/478796/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24651
cve@mitre.orghttp://www.trustix.org/errata/2007/0024/
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2336
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0022
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=277421
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35109
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1643
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
af854a3a-2127-422b-91ae-364da2661108http://bugs.libgd.org/?do=details&task_id=94
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-205.shtml
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37744
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25855Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25860
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26272
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26390
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26415
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26467
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26663
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26766
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26856
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29157
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30168
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42813
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200708-05.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-34.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.libgd.org/ReleaseNote020035
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0146.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/478796/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24651
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0024/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2336
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0022
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=277421
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35109
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1643
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806
Impacted products
Vendor Product Version
libgd gd_graphics_library *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "178BD0FF-2B2E-471E-8519-DC765A3965ED",
              "versionEndIncluding": "2.0.35_rc5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n gdImageCreateXbm en GD Graphics Library (libgd) anterior a 2.0.35 permite a atacantes remotos con la complicidad del usuario provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores no especificados que involucran un fallo en gdImageCreate."
    }
  ],
  "id": "CVE-2007-3473",
  "lastModified": "2024-11-21T00:33:19.737",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-06-28T18:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=94"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37744"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25855"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29157"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2336"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=94"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3473\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.",
      "lastModified": "2007-09-05T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-06-28 18:30
Modified
2024-11-21 00:33
Severity ?
Summary
Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors.
References
cve@mitre.orgftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2007-205.shtml
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
cve@mitre.orghttp://osvdb.org/37743
cve@mitre.orghttp://secunia.com/advisories/25855Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25860Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26272Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26390Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26415Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26467Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26663Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26766Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26856Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30168Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42813Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200708-05.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-34.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200805-13.xml
cve@mitre.orghttp://www.libgd.org/ReleaseNote020035Patch
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:153
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:164
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/478796/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24651
cve@mitre.orghttp://www.trustix.org/errata/2007/0024/
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2336Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0022Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=277421
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35110
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1643
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-205.shtml
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37743
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25855Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25860Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26272Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26390Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26415Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26663Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26766Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26856Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200708-05.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-34.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.libgd.org/ReleaseNote020035Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/478796/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24651
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0024/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2336Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0022Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=277421
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35110
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1643



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "1D5B16D2-156E-4FFE-AB40-A7DA40FD1BAF",
              "versionEndIncluding": "2.0.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DED10C-5B2F-41A8-887F-E53C9498D620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B236A476-9FB9-46A0-859A-86B6B37F6960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B5C6F71F-A65F-4AEF-B846-BDBF8C1965A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FB25E18F-7078-458C-B517-D7DCC942BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B928D03E-BABF-4FFB-B068-63A763301D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "345F2194-D009-45A8-8606-F2DAEC328A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FFB324F6-6271-412C-90D3-B91489200C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "0AC18015-92F0-458A-B27D-BA96645A0FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en GD Graphics Library (libgd) anterior a versi\u00f3n 2.0.35, tienen un impacto no especificado y vectores de ataque remoto asistidos por el usuario."
    }
  ],
  "evaluatorImpact": "An integer overflow exists in the \"gdImageCreateTrueColor()\" function.\r\n",
  "id": "CVE-2007-3474",
  "lastModified": "2024-11-21T00:33:19.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-06-28T18:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37743"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25855"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2336"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35110"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect the versions of gd as shipped with Red Hat Enterprise Linux 2.1 or 3 as they did not offer GIF image support.\n\nWe do not plan to backport a fix for this issue to the gd packages as shipped in Red Hat Enterprise Linux 4 and 5 due to the low\nlikelihood of an application affected by this problem being exposed in a way that would allow a trust boundary to be crossed.",
      "lastModified": "2008-02-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-10-19 20:00
Modified
2024-11-21 01:07
Severity ?
Summary
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.
References
secalert@redhat.comhttp://marc.info/?l=oss-security&m=125562113503923&w=2
secalert@redhat.comhttp://secunia.com/advisories/37069Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/37080Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38055Vendor Advisory
secalert@redhat.comhttp://svn.php.net/viewvc?view=revision&revision=289557
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:285
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/20/5
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0003.html
secalert@redhat.comhttp://www.securityfocus.com/bid/36712
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/2929Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/2930Patch, Vendor Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=125562113503923&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37069Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37080Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38055Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://svn.php.net/viewvc?view=revision&revision=289557
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/20/5
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0003.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36712
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2929Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2930Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DED10C-5B2F-41A8-887F-E53C9498D620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B236A476-9FB9-46A0-859A-86B6B37F6960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B5C6F71F-A65F-4AEF-B846-BDBF8C1965A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FB25E18F-7078-458C-B517-D7DCC942BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7EEB86-6942-4A27-9C6A-9CEA73192E6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B928D03E-BABF-4FFB-B068-63A763301D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "345F2194-D009-45A8-8606-F2DAEC328A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FFB324F6-6271-412C-90D3-B91489200C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "0AC18015-92F0-458A-B27D-BA96645A0FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "EBE1488F-E22A-460E-B7AF-F9EBB56B188D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.36:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "84E950C3-0FA9-4AA2-9FC2-81F30398073A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDFB7E9-8510-430F-BFBC-FD811D60DC78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _gdGetColors en el archivo gd_gd.c en PHP versi\u00f3n 5.2.11 y versiones 5.3.x anteriores a 5.3.1, y GD Graphics Library versiones 2.x, no comprueba apropiadamente un determinado miembro de la estructura colorTotal, lo que podr\u00eda permitir a los atacantes remotos conducir ataques de desbordamiento de b\u00fafer o de lectura excesiva de b\u00fafer por medio de un archivo GD especialmente dise\u00f1ado, una vulnerabilidad diferente de CVE-2009-3293. NOTA: algunos de estos datos fueron obtenidos de la informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2009-3546",
  "lastModified": "2024-11-21T01:07:37.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-19T20:00:00.657",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=oss-security\u0026m=125562113503923\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37069"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37080"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38055"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.php.net/viewvc?view=revision\u0026revision=289557"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:285"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/36712"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2929"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2930"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=125562113503923\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.php.net/viewvc?view=revision\u0026revision=289557"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-06-28 18:30
Modified
2024-11-21 00:33
Severity ?
Summary
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.
References
cve@mitre.orgftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzPatch
cve@mitre.orghttp://bugs.libgd.org/?do=details&task_id=74Exploit
cve@mitre.orghttp://bugs.libgd.org/?do=details&task_id=92
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2007-205.shtml
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
cve@mitre.orghttp://osvdb.org/42062
cve@mitre.orghttp://secunia.com/advisories/25860Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26272Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26390Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26415Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26467Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26663Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26766Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26856Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30168Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31168Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42813Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200708-05.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200711-34.xml
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200805-13.xml
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1613
cve@mitre.orghttp://www.libgd.org/ReleaseNote020035Patch
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:153
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:164
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_15_sr.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/478796/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24651
cve@mitre.orghttp://www.trustix.org/errata/2007/0024/
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0022Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=277421
cve@mitre.orghttps://issues.rpath.com/browse/RPL-1643
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzPatch
af854a3a-2127-422b-91ae-364da2661108http://bugs.libgd.org/?do=details&task_id=74Exploit
af854a3a-2127-422b-91ae-364da2661108http://bugs.libgd.org/?do=details&task_id=92
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2007-205.shtml
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42062
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25860Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26272Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26390Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26415Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26663Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26766Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26856Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31168Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200708-05.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200711-34.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1613
af854a3a-2127-422b-91ae-364da2661108http://www.libgd.org/ReleaseNote020035Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_15_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/478796/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24651
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0024/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0022Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=277421
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1643



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "1D5B16D2-156E-4FFE-AB40-A7DA40FD1BAF",
              "versionEndIncluding": "2.0.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DED10C-5B2F-41A8-887F-E53C9498D620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "B236A476-9FB9-46A0-859A-86B6B37F6960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B5C6F71F-A65F-4AEF-B846-BDBF8C1965A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FB25E18F-7078-458C-B517-D7DCC942BF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B928D03E-BABF-4FFB-B068-63A763301D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "345F2194-D009-45A8-8606-F2DAEC328A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FFB324F6-6271-412C-90D3-B91489200C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "0AC18015-92F0-458A-B27D-BA96645A0FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value."
    },
    {
      "lang": "es",
      "value": "Las funciones (a) imagearc y (b) imagefilledarc en GD Graphics Library (libgd) anterior a versi\u00f3n 2.0.35, permiten a los atacantes causar una denegaci\u00f3n de servicio (consumo de CPU) por medio de un largo valor (1) de inicio o (2) de grado de \u00e1ngulo final."
    }
  ],
  "id": "CVE-2007-3477",
  "lastModified": "2024-11-21T00:33:20.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-06-28T18:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=74"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=92"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42062"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31168"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1613"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=74"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.libgd.org/?do=details\u0026task_id=92"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.libgd.org/ReleaseNote020035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0024/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1643"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Due to the minimal impact of this flaw (temporary DoS by high CPU usage) and low likelihood of this problem being exposed in a way that would allow trust boundary crossing, we currently do not plan to backport a fix for this issue to the versions of gd as shipped in Red Hat Enterprise Linux 2.1, 3, 4 or 5.",
      "lastModified": "2008-02-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}