CVE-2008-3658

Published Aug 15, 2008

Last updated 6 years ago

Overview

Description
Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-119

Evaluator

Comment
Mitre Description references "PHP 5.6 through 5.2.6" -- however research to the changelog for PHP 5 does not reflect a 5.6 release changelog: http://www.php.net/ChangeLog-5.php However, http://www.openwall.com/lists/oss-security/2008/08/08/2: "Those issues are fixed by the recent php-4.4.9 release, but they affect php-5.2.6 as well and the fixes are not part of any released version in case of 5.2."
Impact
-
Solution
-

Vendor comments

  • Red HatThis issue has been addressed in the affected versions of PHP packages shipped in Red Hat Enterprise Linux via advisories listed on the following page: https://rhn.redhat.com/errata/CVE-2008-3658.html

Configurations

References