Rapid7 Vulnerability & Exploit Database

CESA-2008:0146: RHSA-2008:0146

Back to Search

CESA-2008:0146: RHSA-2008:0146

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/30/2007
Created
07/25/2018
Added
03/12/2010
Modified
08/29/2017

Description

Moderate: gd security updateThe gd package contains a graphics library used for the dynamic creation ofimages such as PNG and JPEG.Multiple issues were discovered in the gd GIF image-handling code. Acarefully-crafted GIF file could cause a crash or possibly execute codewith the privileges of the application using the gd library.(CVE-2006-4484, CVE-2007-3475, CVE-2007-3476)An integer overflow was discovered in the gdImageCreateTrueColor()function, leading to incorrect memory allocations. A carefully craftedimage could cause a crash or possibly execute code with the privileges ofthe application using the gd library. (CVE-2007-3472)A buffer over-read flaw was discovered. This could cause a crash in anapplication using the gd library to render certain strings using aJIS-encoded font. (CVE-2007-0455)A flaw was discovered in the gd PNG image handling code. A truncated PNGimage could cause an infinite loop in an application using the gd library.(CVE-2007-2756)A flaw was discovered in the gd X BitMap (XBM) image-handling code. Amalformed or truncated XBM image could cause a crash in an applicationusing the gd library. (CVE-2007-3473)Users of gd should upgrade to these updated packages, which containbackported patches which resolve these issues.

Solution(s)

  • centos-upgrade-gd
  • centos-upgrade-gd-devel
  • centos-upgrade-gd-progs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;