- Description
- Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:N/A:P
- Hype score
- Not currently trending
- Comment
- -
- Impact
- An integer overflow exists in the "gdImageCreateTrueColor()" function.
- Solution
- An integer overflow exists in the "gdImageCreateTrueColor()" function.
- Red HatThis issue did not affect the versions of gd as shipped with Red Hat Enterprise Linux 2.1 or 3 as they did not offer GIF image support. We do not plan to backport a fix for this issue to the gd packages as shipped in Red Hat Enterprise Linux 4 and 5 due to the low likelihood of an application affected by this problem being exposed in a way that would allow a trust boundary to be crossed.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1D5B16D2-156E-4FFE-AB40-A7DA40FD1BAF",
"versionEndIncluding": "2.0.35"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "83DED10C-5B2F-41A8-887F-E53C9498D620"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B236A476-9FB9-46A0-859A-86B6B37F6960"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B5C6F71F-A65F-4AEF-B846-BDBF8C1965A3"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FB25E18F-7078-458C-B517-D7DCC942BF80"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B928D03E-BABF-4FFB-B068-63A763301D31"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "345F2194-D009-45A8-8606-F2DAEC328A3A"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FFB324F6-6271-412C-90D3-B91489200C8D"
},
{
"criteria": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0AC18015-92F0-458A-B27D-BA96645A0FB5"
}
],
"operator": "OR"
}
]
}
]