Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/13179/ - | |
References | () http://secunia.com/advisories/18686 - | |
References | () http://secunia.com/advisories/20824 - | |
References | () http://secunia.com/advisories/21050 - | |
References | () http://www.ciac.org/ciac/bulletins/p-071.shtml - | |
References | () http://www.debian.org/security/2004/dsa-601 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:113 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:114 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-638.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0194.html - | |
References | () http://www.securityfocus.com/bid/11663 - Patch, Vendor Advisory | |
References | () http://www.trustix.org/errata/2004/0058 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18048 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11176 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1195 - | |
References | () https://www.ubuntu.com/usn/usn-25-1/ - | |
References | () https://www.ubuntu.com/usn/usn-33-1/ - |
Information
Published : 2005-02-09 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0941
Mitre link : CVE-2004-0941
CVE.ORG link : CVE-2004-0941
JSON object : View
Products Affected
gd_graphics_library
- gdlib
trustix
- secure_linux
CWE