Vulnerability Name:

CVE-2004-0990 (CCN-17866)

Assigned:2004-10-26
Published:2004-10-26
Updated:2017-10-11
Summary:Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Mon Oct 25 2004 - 19:43:03 CDT
libgd integer overflow

Source: MITRE
Type: CNA
CVE-2004-0990

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:003

Source: BUGTRAQ
Type: UNKNOWN
20041026 libgd integer overflow

Source: CCN
Type: RHSA-2004-638
gd security update

Source: SECUNIA
Type: UNKNOWN
18717

Source: SECUNIA
Type: UNKNOWN
20824

Source: SECUNIA
Type: UNKNOWN
20866

Source: SECUNIA
Type: UNKNOWN
21050

Source: SECUNIA
Type: UNKNOWN
23783

Source: CCN
Type: Boutell Web site
GD Graphics Library

Source: CCN
Type: CIAC Information Bulletin P-033
"libgd" Integer Overflows

Source: CCN
Type: CIAC Information Bulletin P-071
Updated "gd" Packages

Source: CIAC
Type: UNKNOWN
P-071

Source: DEBIAN
Type: UNKNOWN
DSA-589

Source: DEBIAN
Type: UNKNOWN
DSA-591

Source: DEBIAN
Type: UNKNOWN
DSA-601

Source: DEBIAN
Type: UNKNOWN
DSA-602

Source: DEBIAN
Type: DSA 589-1
integer overflows

Source: DEBIAN
Type: DSA-589
libgd1 -- integer overflows

Source: DEBIAN
Type: DSA-591
libgd2 -- integer overflows

Source: DEBIAN
Type: DSA-601
libgd -- integer overflow

Source: DEBIAN
Type: DSA-602
libgd2 -- integer overflow

Source: CCN
Type: GLSA-200411-08
GD: Integer overflow

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2004:132

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:113

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:114

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:122

Source: CCN
Type: OpenPKG-SA-2004.049
gd

Source: OSVDB
Type: UNKNOWN
11190

Source: CCN
Type: OSVDB ID: 11190
GD Graphics Library PNG Handling gdImageCreateFromPngCtx() Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2004:638

Source: BID
Type: Patch, Vendor Advisory
11523

Source: CCN
Type: BID-11523
GD Graphics Library Remote Integer Overflow Vulnerability

Source: CCN
Type: Trustix Secure Linux Security Advisory #2004-0058
Various security fixes

Source: TRUSTIX
Type: UNKNOWN
2004-0058

Source: CCN
Type: TLSA-2007-16
libwmf buffer over flow

Source: CCN
Type: USN-11-1
libgd2 vulnerabilities

Source: CCN
Type: USN-21-1
libgd vulnerabilities

Source: CCN
Type: USN-25-1
libgd2 vulnerability

Source: CCN
Type: USN-33-1
libgd vulnerabilities

Source: XF
Type: UNKNOWN
gd-png-bo(17866)

Source: XF
Type: UNKNOWN
gd-png-bo(17866)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-939

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1260

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9952

Source: SUSE
Type: SUSE-SR:2006:003
SUSE Security Summary Report

Source: UBUNTU
Type: UNKNOWN
USN-11-1

Source: UBUNTU
Type: UNKNOWN
USN-25-1

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040990
    V
    CVE-2004-0990
    2015-11-16
    oval:org.mitre.oval:def:9952
    V
    Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
    2013-04-29
    oval:org.mitre.oval:def:1260
    V
    Integer Overflow in libgd2
    2005-08-18
    oval:com.redhat.rhsa:def:20040638
    P
    RHSA-2004:638: gd security update (Important)
    2005-05-26
    oval:org.debian:def:602
    V
    integer overflow
    2004-11-29
    oval:org.debian:def:601
    V
    integer overflow
    2004-11-29
    oval:org.debian:def:589
    V
    integer overflows
    2004-11-09
    oval:org.debian:def:591
    V
    integer overflows
    2004-11-09
    BACK
    gd_graphics_library gdlib 1.8.4
    gd_graphics_library gdlib 2.0.1
    gd_graphics_library gdlib 2.0.15
    gd_graphics_library gdlib 2.0.20
    gd_graphics_library gdlib 2.0.21
    gd_graphics_library gdlib 2.0.22
    gd_graphics_library gdlib 2.0.23
    gd_graphics_library gdlib 2.0.26
    gd_graphics_library gdlib 2.0.27
    gd_graphics_library gdlib 2.0.28
    openpkg openpkg 2.1
    openpkg openpkg 2.2
    openpkg openpkg current
    gentoo linux *
    suse suse linux 8.0
    suse suse linux 8.1
    suse suse linux 8.2
    suse suse linux 9.0
    suse suse linux 9.0
    suse suse linux 9.1
    suse suse linux 9.2
    trustix secure linux 1.5
    trustix secure linux 2.0
    trustix secure linux 2.1
    trustix secure linux 2.2