[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:038 -- Mandriva gd

ID: oval:org.secpod.oval:def:301503Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




Buffer overflow in the LWZReadByte function in gd_gif_in.c in GD prior to 2.0.34 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array. This was originally fixed in PHP"s embedded GD with MDKSA-2006:162; patches had not been applied to the system libgd at that time. The updated packages have been patched to correct this issue.

Platform:
Mandriva Linux 2007.0
Product:
gd
Reference:
MDVSA-2008:038
CVE-2006-4484
CVE    1
CVE-2006-4484
CPE    1
cpe:/o:mandriva:linux:2007.0

© SecPod Technologies