CVE-2006-2906

The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.
References
Link Resource
http://secunia.com/advisories/20500 Vendor Advisory
http://secunia.com/advisories/20571
http://secunia.com/advisories/20676
http://secunia.com/advisories/20853
http://secunia.com/advisories/20866
http://secunia.com/advisories/20887
http://secunia.com/advisories/21050
http://secunia.com/advisories/21186
http://secunia.com/advisories/23783
http://securityreason.com/securityalert/1067
http://www.debian.org/security/2006/dsa-1117
http://www.mandriva.com/security/advisories?name=MDKSA-2006:112
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.novell.com/linux/security/advisories/2006_31_php.html
http://www.securityfocus.com/archive/1/436132 Exploit
http://www.securityfocus.com/bid/18294 Exploit
http://www.trustix.org/errata/2006/0038
http://www.vupen.com/english/advisories/2006/2174
https://exchange.xforce.ibmcloud.com/vulnerabilities/26976
https://issues.rpath.com/browse/RPL-939
https://usn.ubuntu.com/298-1/
http://secunia.com/advisories/20500 Vendor Advisory
http://secunia.com/advisories/20571
http://secunia.com/advisories/20676
http://secunia.com/advisories/20853
http://secunia.com/advisories/20866
http://secunia.com/advisories/20887
http://secunia.com/advisories/21050
http://secunia.com/advisories/21186
http://secunia.com/advisories/23783
http://securityreason.com/securityalert/1067
http://www.debian.org/security/2006/dsa-1117
http://www.mandriva.com/security/advisories?name=MDKSA-2006:112
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
http://www.novell.com/linux/security/advisories/2006_31_php.html
http://www.securityfocus.com/archive/1/436132 Exploit
http://www.securityfocus.com/bid/18294 Exploit
http://www.trustix.org/errata/2006/0038
http://www.vupen.com/english/advisories/2006/2174
https://exchange.xforce.ibmcloud.com/vulnerabilities/26976
https://issues.rpath.com/browse/RPL-939
https://usn.ubuntu.com/298-1/
Configurations

Configuration 1 (hide)

cpe:2.3:a:thomas_boutell:graphics_draw_library:2.0.33:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://secunia.com/advisories/20500 - Vendor Advisory () http://secunia.com/advisories/20500 - Vendor Advisory
References () http://secunia.com/advisories/20571 - () http://secunia.com/advisories/20571 -
References () http://secunia.com/advisories/20676 - () http://secunia.com/advisories/20676 -
References () http://secunia.com/advisories/20853 - () http://secunia.com/advisories/20853 -
References () http://secunia.com/advisories/20866 - () http://secunia.com/advisories/20866 -
References () http://secunia.com/advisories/20887 - () http://secunia.com/advisories/20887 -
References () http://secunia.com/advisories/21050 - () http://secunia.com/advisories/21050 -
References () http://secunia.com/advisories/21186 - () http://secunia.com/advisories/21186 -
References () http://secunia.com/advisories/23783 - () http://secunia.com/advisories/23783 -
References () http://securityreason.com/securityalert/1067 - () http://securityreason.com/securityalert/1067 -
References () http://www.debian.org/security/2006/dsa-1117 - () http://www.debian.org/security/2006/dsa-1117 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:112 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:112 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:113 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:113 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:122 -
References () http://www.novell.com/linux/security/advisories/2006_31_php.html - () http://www.novell.com/linux/security/advisories/2006_31_php.html -
References () http://www.securityfocus.com/archive/1/436132 - Exploit () http://www.securityfocus.com/archive/1/436132 - Exploit
References () http://www.securityfocus.com/bid/18294 - Exploit () http://www.securityfocus.com/bid/18294 - Exploit
References () http://www.trustix.org/errata/2006/0038 - () http://www.trustix.org/errata/2006/0038 -
References () http://www.vupen.com/english/advisories/2006/2174 - () http://www.vupen.com/english/advisories/2006/2174 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26976 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26976 -
References () https://issues.rpath.com/browse/RPL-939 - () https://issues.rpath.com/browse/RPL-939 -
References () https://usn.ubuntu.com/298-1/ - () https://usn.ubuntu.com/298-1/ -

Information

Published : 2006-06-08 16:06

Updated : 2024-11-21 00:12


NVD link : CVE-2006-2906

Mitre link : CVE-2006-2906

CVE.ORG link : CVE-2006-2906


JSON object : View

Products Affected

thomas_boutell

  • graphics_draw_library