Rapid7 Vulnerability & Exploit Database

CESA-2004:638: gd security update

Back to Search

CESA-2004:638: gd security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
03/01/2005
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated gd packages that fix security issues with overflow in various memory allocation calls are now available. [Updated 24 May 2005] Multilib packages have been added to this advisory

The gd packages contain a graphics library used for the dynamic creation of images such as PNG and JPEG. Several buffer overflows were reported in various memory allocation calls. An attacker could create a carefully crafted image file in such a way that it could cause ImageMagick to execute arbitrary code when processing the image. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0990 to these issues. While researching the fixes to these overflows, additional buffer overflows were discovered in calls to gdMalloc. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0941 to these issues. Users of gd should upgrade to these updated packages, which contain a backported security patch, and are not vulnerable to these issues.

Solution(s)

  • centos-upgrade-gd
  • centos-upgrade-gd-devel
  • centos-upgrade-gd-progs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;