Vulnerability Name: | CVE-2004-0990 (CCN-17866) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2004-10-26 | ||||||||||||||||||||||||||||||||||||
Published: | 2004-10-26 | ||||||||||||||||||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Oct 25 2004 - 19:43:03 CDT libgd integer overflow Source: MITRE Type: CNA CVE-2004-0990 Source: SUSE Type: UNKNOWN SUSE-SR:2006:003 Source: BUGTRAQ Type: UNKNOWN 20041026 libgd integer overflow Source: CCN Type: RHSA-2004-638 gd security update Source: SECUNIA Type: UNKNOWN 18717 Source: SECUNIA Type: UNKNOWN 20824 Source: SECUNIA Type: UNKNOWN 20866 Source: SECUNIA Type: UNKNOWN 21050 Source: SECUNIA Type: UNKNOWN 23783 Source: CCN Type: Boutell Web site GD Graphics Library Source: CCN Type: CIAC Information Bulletin P-033 "libgd" Integer Overflows Source: CCN Type: CIAC Information Bulletin P-071 Updated "gd" Packages Source: CIAC Type: UNKNOWN P-071 Source: DEBIAN Type: UNKNOWN DSA-589 Source: DEBIAN Type: UNKNOWN DSA-591 Source: DEBIAN Type: UNKNOWN DSA-601 Source: DEBIAN Type: UNKNOWN DSA-602 Source: DEBIAN Type: DSA 589-1 integer overflows Source: DEBIAN Type: DSA-589 libgd1 -- integer overflows Source: DEBIAN Type: DSA-591 libgd2 -- integer overflows Source: DEBIAN Type: DSA-601 libgd -- integer overflow Source: DEBIAN Type: DSA-602 libgd2 -- integer overflow Source: CCN Type: GLSA-200411-08 GD: Integer overflow Source: MANDRAKE Type: UNKNOWN MDKSA-2004:132 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:113 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:114 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:122 Source: CCN Type: OpenPKG-SA-2004.049 gd Source: OSVDB Type: UNKNOWN 11190 Source: CCN Type: OSVDB ID: 11190 GD Graphics Library PNG Handling gdImageCreateFromPngCtx() Overflow Source: REDHAT Type: UNKNOWN RHSA-2004:638 Source: BID Type: Patch, Vendor Advisory 11523 Source: CCN Type: BID-11523 GD Graphics Library Remote Integer Overflow Vulnerability Source: CCN Type: Trustix Secure Linux Security Advisory #2004-0058 Various security fixes Source: TRUSTIX Type: UNKNOWN 2004-0058 Source: CCN Type: TLSA-2007-16 libwmf buffer over flow Source: CCN Type: USN-11-1 libgd2 vulnerabilities Source: CCN Type: USN-21-1 libgd vulnerabilities Source: CCN Type: USN-25-1 libgd2 vulnerability Source: CCN Type: USN-33-1 libgd vulnerabilities Source: XF Type: UNKNOWN gd-png-bo(17866) Source: XF Type: UNKNOWN gd-png-bo(17866) Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-939 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:1260 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9952 Source: SUSE Type: SUSE-SR:2006:003 SUSE Security Summary Report Source: UBUNTU Type: UNKNOWN USN-11-1 Source: UBUNTU Type: UNKNOWN USN-25-1 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |