Vulnerability Name:

CVE-2006-2906 (CCN-26976)

Assigned:2006-06-06
Published:2006-06-06
Updated:2018-10-03
Summary:The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.4 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Tue Jun 06 2006 - 09:02:47 CDT
libgd 2.0.33 infinite loop in GIF decoding ?

Source: MITRE
Type: CNA
CVE-2006-2906

Source: CCN
Type: SA20500
GD Graphics Library GIF File Handling Denial of Service

Source: SECUNIA
Type: Vendor Advisory
20500

Source: SECUNIA
Type: UNKNOWN
20571

Source: SECUNIA
Type: UNKNOWN
20676

Source: SECUNIA
Type: UNKNOWN
20853

Source: SECUNIA
Type: UNKNOWN
20866

Source: SECUNIA
Type: UNKNOWN
20887

Source: SECUNIA
Type: UNKNOWN
21050

Source: SECUNIA
Type: UNKNOWN
21186

Source: SECUNIA
Type: UNKNOWN
23783

Source: SREASON
Type: UNKNOWN
1067

Source: CCN
Type: Boutell.com
GD Graphics Library

Source: DEBIAN
Type: UNKNOWN
DSA-1117

Source: DEBIAN
Type: DSA-1117
libgd2 -- insufficient input sanitising

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:112

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:113

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:122

Source: SUSE
Type: UNKNOWN
SUSE-SA:2006:031

Source: CCN
Type: OSVDB ID: 26260
GD Graphics Library gdImageCreateFromGifPtr() Function GIF Processing DoS

Source: BUGTRAQ
Type: Exploit
20060606 libgd 2.0.33 infinite loop in GIF decoding ?

Source: BID
Type: Exploit
18294

Source: CCN
Type: BID-18294
GD Graphics Library Remote Denial of Service Vulnerability

Source: CCN
Type: BID-18347
GD Graphics Library Truncated GIF File Remote Denial of Service Vulnerability

Source: TRUSTIX
Type: UNKNOWN
2006-0038

Source: CCN
Type: USN-298-1
libgd2 vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-2174

Source: XF
Type: UNKNOWN
gdgraphicslibrary-gif-dos(26976)

Source: XF
Type: UNKNOWN
gdgraphicslibrary-gif-dos(26976)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-939

Source: UBUNTU
Type: UNKNOWN
USN-298-1

Source: SUSE
Type: SUSE-SA:2006:031
php4php5 security problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:thomas_boutell:graphics_draw_library:2.0.33:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:1117
    V
    insufficient input sanitising
    2006-07-21
    BACK
    thomas_boutell graphics draw library 2.0.33