Mandriva Linux Security Advisory : gd (MDVSA-2008:038)

low Nessus Plugin ID 37016

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Buffer overflow in the LWZReadByte() function in gd_gif_in.c in GD prior to 2.0.34 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

This was originally fixed in PHP's embedded GD with MDKSA-2006:162;
patches had not been applied to the system libgd at that time.

The updated packages have been patched to correct this issue.

Solution

Update the affected packages.

Plugin Details

Severity: Low

ID: 37016

File Name: mandriva_MDVSA-2008-038.nasl

Version: 1.18

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gd-utils, p-cpe:/a:mandriva:linux:lib64gd2, p-cpe:/a:mandriva:linux:lib64gd2-devel, p-cpe:/a:mandriva:linux:lib64gd2-static-devel, p-cpe:/a:mandriva:linux:libgd2, p-cpe:/a:mandriva:linux:libgd2-devel, p-cpe:/a:mandriva:linux:libgd2-static-devel, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/7/2008

Vulnerability Publication Date: 8/17/2006

Reference Information

CVE: CVE-2006-4484

BID: 19582

MDVSA: 2008:038