CVE-2004-0990

Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
References
Link Resource
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
http://marc.info/?l=bugtraq&m=109882489302099&w=2
http://secunia.com/advisories/18717
http://secunia.com/advisories/20824
http://secunia.com/advisories/20866
http://secunia.com/advisories/21050
http://secunia.com/advisories/23783
http://www.ciac.org/ciac/bulletins/p-071.shtml
http://www.debian.org/security/2004/dsa-589
http://www.debian.org/security/2004/dsa-591
http://www.debian.org/security/2004/dsa-601
http://www.debian.org/security/2004/dsa-602
http://www.mandriva.com/security/advisories?name=MDKSA-2004:132
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
http://www.mandriva.com/security/advisories?name=MDKSA-2006:114
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.osvdb.org/11190
http://www.redhat.com/support/errata/RHSA-2004-638.html
http://www.securityfocus.com/bid/11523 Patch Vendor Advisory
http://www.trustix.org/errata/2004/0058
https://exchange.xforce.ibmcloud.com/vulnerabilities/17866
https://issues.rpath.com/browse/RPL-939
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952
https://www.ubuntu.com/usn/usn-11-1/
https://www.ubuntu.com/usn/usn-25-1/
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
http://marc.info/?l=bugtraq&m=109882489302099&w=2
http://secunia.com/advisories/18717
http://secunia.com/advisories/20824
http://secunia.com/advisories/20866
http://secunia.com/advisories/21050
http://secunia.com/advisories/23783
http://www.ciac.org/ciac/bulletins/p-071.shtml
http://www.debian.org/security/2004/dsa-589
http://www.debian.org/security/2004/dsa-591
http://www.debian.org/security/2004/dsa-601
http://www.debian.org/security/2004/dsa-602
http://www.mandriva.com/security/advisories?name=MDKSA-2004:132
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
http://www.mandriva.com/security/advisories?name=MDKSA-2006:114
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.osvdb.org/11190
http://www.redhat.com/support/errata/RHSA-2004-638.html
http://www.securityfocus.com/bid/11523 Patch Vendor Advisory
http://www.trustix.org/errata/2004/0058
https://exchange.xforce.ibmcloud.com/vulnerabilities/17866
https://issues.rpath.com/browse/RPL-939
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952
https://www.ubuntu.com/usn/usn-11-1/
https://www.ubuntu.com/usn/usn-25-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gd_graphics_library:gdlib:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.20:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.21:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.22:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.23:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.26:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.27:*:*:*:*:*:*:*
cpe:2.3:a:gd_graphics_library:gdlib:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html - () http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html -
References () http://marc.info/?l=bugtraq&m=109882489302099&w=2 - () http://marc.info/?l=bugtraq&m=109882489302099&w=2 -
References () http://secunia.com/advisories/18717 - () http://secunia.com/advisories/18717 -
References () http://secunia.com/advisories/20824 - () http://secunia.com/advisories/20824 -
References () http://secunia.com/advisories/20866 - () http://secunia.com/advisories/20866 -
References () http://secunia.com/advisories/21050 - () http://secunia.com/advisories/21050 -
References () http://secunia.com/advisories/23783 - () http://secunia.com/advisories/23783 -
References () http://www.ciac.org/ciac/bulletins/p-071.shtml - () http://www.ciac.org/ciac/bulletins/p-071.shtml -
References () http://www.debian.org/security/2004/dsa-589 - () http://www.debian.org/security/2004/dsa-589 -
References () http://www.debian.org/security/2004/dsa-591 - () http://www.debian.org/security/2004/dsa-591 -
References () http://www.debian.org/security/2004/dsa-601 - () http://www.debian.org/security/2004/dsa-601 -
References () http://www.debian.org/security/2004/dsa-602 - () http://www.debian.org/security/2004/dsa-602 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:132 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:132 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:113 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:113 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:114 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:114 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 -
References () http://www.osvdb.org/11190 - () http://www.osvdb.org/11190 -
References () http://www.redhat.com/support/errata/RHSA-2004-638.html - () http://www.redhat.com/support/errata/RHSA-2004-638.html -
References () http://www.securityfocus.com/bid/11523 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11523 - Patch, Vendor Advisory
References () http://www.trustix.org/errata/2004/0058 - () http://www.trustix.org/errata/2004/0058 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17866 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17866 -
References () https://issues.rpath.com/browse/RPL-939 - () https://issues.rpath.com/browse/RPL-939 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952 -
References () https://www.ubuntu.com/usn/usn-11-1/ - () https://www.ubuntu.com/usn/usn-11-1/ -
References () https://www.ubuntu.com/usn/usn-25-1/ - () https://www.ubuntu.com/usn/usn-25-1/ -

Information

Published : 2005-03-01 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0990

Mitre link : CVE-2004-0990

CVE.ORG link : CVE-2004-0990


JSON object : View

Products Affected

trustix

  • secure_linux

suse

  • suse_linux

gentoo

  • linux

gd_graphics_library

  • gdlib

openpkg

  • openpkg