[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-3996

Date: (C)2007-09-04   (M)2017-10-04
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.

Reference:
2007-0026
SECUNIA-26642
SECUNIA-26822
SECUNIA-26838
SECUNIA-26871
SECUNIA-26895
SECUNIA-26930
SECUNIA-26967
SECUNIA-27102
SECUNIA-27351
SECUNIA-27377
SECUNIA-27545
SECUNIA-28009
SECUNIA-28147
SECUNIA-28658
SREASON-3103
SECUNIA-31168
ADV-2007-3023
DSA-1613
FEDORA-2007-709
GLSA-200710-02
GLSA-200712-13
MDKSA-2007:187
RHSA-2007:0888
RHSA-2007:0889
RHSA-2007:0890
RHSA-2007:0891
SUSE-SA:2008:004
USN-557-1
http://bugs.gentoo.org/show_bug.cgi?id=201546
http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/releases/5_2_4.php
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
php-gdimagecopyresized-bo(36383)
php-gdimagecreate-bo(36382)

CPE    1
cpe:/a:php:php:5.2.3
CWE    1
CWE-189
OVAL    2
oval:org.secpod.oval:def:700415
oval:org.mitre.oval:def:7842

© 2013 SecPod Technologies