Description
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
Product(s):
- GD Graphics Library GDlib 1.8.4
- GD Graphics Library GDlib 2.0.15
- GD Graphics Library GDlib 2.0.1
- GD Graphics Library GDlib 2.0.20
- GD Graphics Library GDlib 2.0.21
- GD Graphics Library GDlib 2.0.22
- GD Graphics Library GDlib 2.0.23
- GD Graphics Library GDlib 2.0.26
- GD Graphics Library GDlib 2.0.27
- GD Graphics Library GDlib 2.0.28
- OpenPKG 2.1
- OpenPKG 2.2
- OpenPKG OpenPKG Current
- Gentoo Linux
- Gentoo Linux 1.2
- Gentoo Linux 1.4
- Gentoo Linux 1.4 -
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- Gentoo Linux 2.1.30 r9
- Gentoo Linux 2.2.28 r7
- Gentoo Linux 2.3.30 r2
- SuSE SuSE Linux 8.0
- SuSE SuSE Linux 8.0 alpha
- SuSE SuSE Linux 8.1
- SuSE SuSE Linux 8.2
- SuSE SuSE Linux 9.0
- Suse Suse Linux 9.0 Enterprise Server Edition
- SUSE Linux 9.0 x86_64
- SuSE SuSE Linux 9.1
- SuSE SuSE Linux 9.2
- Trustix Secure Linux 1.5
- Trustix Secure Linux 2.0
- Trustix Secure Linux 2.1
- Trustix Secure Linux 2.2
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0990, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0990 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.