Vulnerability Name: | CVE-2007-0455 (CCN-31907) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2007-01-26 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2007-01-26 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-07-21 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: CCN Type: Red Hat Bugzilla Bug 224607 CVE-2007-0455 gd buffer overrun Source: CONFIRM Type: Issue Tracking, Third Party Advisory http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607 Source: MITRE Type: CNA CVE-2007-0455 Source: FEDORA Type: Broken Link FEDORA-2007-150 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2010-19033 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2010-19022 Source: MLIST Type: Broken Link [security-announce] 20070208 rPSA-2007-0028-1 gd Source: CCN Type: RHSA-2007-0153 Moderate: php security update Source: CCN Type: RHSA-2007-0155 Important: php security update Source: REDHAT Type: Third Party Advisory RHSA-2007:0155 Source: CCN Type: RHSA-2007-0162 Moderate: php security update Source: CCN Type: RHSA-2008-0146 Moderate: gd security update Source: CCN Type: SA23916 GD Graphics Library "gdImageStringFTEx()" Denial of Service Source: SECUNIA Type: Not Applicable, Vendor Advisory 23916 Source: SECUNIA Type: Not Applicable 24022 Source: SECUNIA Type: Not Applicable 24052 Source: SECUNIA Type: Not Applicable 24053 Source: SECUNIA Type: Not Applicable 24107 Source: SECUNIA Type: Not Applicable 24143 Source: SECUNIA Type: Not Applicable 24151 Source: SECUNIA Type: Not Applicable 24924 Source: SECUNIA Type: Not Applicable 24945 Source: SECUNIA Type: Not Applicable 24965 Source: SECUNIA Type: Not Applicable 25575 Source: SECUNIA Type: Not Applicable 29157 Source: SECUNIA Type: Not Applicable 42813 Source: CCN Type: ASA-2007-181 php security update (RHSA-2007-0162) Source: CCN Type: ASA-2007-196 php security update (RHSA-2007-0155) Source: CCN Type: ASA-2008-099 gd security update (RHSA-2008-0146) Source: CCN Type: Boutell.com GD Graphics Library Source: DEBIAN Type: DSA-1936 libgd2 -- several vulnerabilities Source: MANDRIVA Type: Broken Link MDKSA-2007:035 Source: MANDRIVA Type: Broken Link MDKSA-2007:036 Source: MANDRIVA Type: Broken Link MDKSA-2007:038 Source: MANDRIVA Type: Broken Link MDKSA-2007:109 Source: CCN Type: OpenPKG-SA-2007.016 libgd Source: REDHAT Type: Third Party Advisory RHSA-2007:0153 Source: REDHAT Type: Third Party Advisory RHSA-2007:0162 Source: REDHAT Type: Third Party Advisory RHSA-2008:0146 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20070418 rPSA-2007-0073-1 php php-mysql php-pgsql Source: BID Type: Third Party Advisory, VDB Entry 22289 Source: CCN Type: BID-22289 GD Graphics Library JIS-Encoded Font Buffer Overflow Vulnerability Source: TRUSTIX Type: Broken Link 2007-0007 Source: CCN Type: TLSA-2007-11 Buffer overflow Source: CCN Type: TLSA-2007-16 libwmf buffer over flow Source: CCN Type: USN-473-1 libgd2 vulnerabilities Source: UBUNTU Type: Third Party Advisory USN-473-1 Source: VUPEN Type: Permissions Required ADV-2007-0400 Source: VUPEN Type: Permissions Required ADV-2011-0022 Source: XF Type: UNKNOWN gdgraphicslibrary-gdft-bo(31907) Source: CONFIRM Type: Broken Link https://issues.rpath.com/browse/RPL-1030 Source: CONFIRM Type: Broken Link https://issues.rpath.com/browse/RPL-1268 Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:11303 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |