[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:038 -- Mandriva gd

ID: oval:org.secpod.oval:def:301503Date: (C)2012-01-07   (M)2017-10-12
Class: PATCHFamily: unix




Buffer overflow in the LWZReadByte function in gd_gif_in.c in GD prior to 2.0.34 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array. This was originally fixed in PHP"s embedded GD with MDKSA-2006:162; patches had not been applied to the system libgd at that time. The updated packages have been patched to correct this issue.

Platform:
Mandriva Linux 2007.0
Product:
gd
Reference:
MDVSA-2008:038
CVE-2006-4484
CVE    1
CVE-2006-4484

© 2013 SecPod Technologies