CentOS 4 / 5 : gd (CESA-2008:0146)

High Nessus Plugin ID 31310

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated gd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The gd package contains a graphics library used for the dynamic creation of images such as PNG and JPEG.

Multiple issues were discovered in the gd GIF image-handling code. A carefully-crafted GIF file could cause a crash or possibly execute code with the privileges of the application using the gd library.
(CVE-2006-4484, CVE-2007-3475, CVE-2007-3476)

An integer overflow was discovered in the gdImageCreateTrueColor() function, leading to incorrect memory allocations. A carefully crafted image could cause a crash or possibly execute code with the privileges of the application using the gd library. (CVE-2007-3472)

A buffer over-read flaw was discovered. This could cause a crash in an application using the gd library to render certain strings using a JIS-encoded font. (CVE-2007-0455)

A flaw was discovered in the gd PNG image handling code. A truncated PNG image could cause an infinite loop in an application using the gd library. (CVE-2007-2756)

A flaw was discovered in the gd X BitMap (XBM) image-handling code. A malformed or truncated XBM image could cause a crash in an application using the gd library. (CVE-2007-3473)

Users of gd should upgrade to these updated packages, which contain backported patches which resolve these issues.

Solution

Update the affected gd packages.

See Also

http://www.nessus.org/u?14a13367

http://www.nessus.org/u?34d3ce35

http://www.nessus.org/u?b3db165a

http://www.nessus.org/u?53ef0c9f

http://www.nessus.org/u?f07b1add

Plugin Details

Severity: High

ID: 31310

File Name: centos_RHSA-2008-0146.nasl

Version: 1.19

Type: local

Agent: unix

Published: 2008/02/29

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:gd, p-cpe:/a:centos:centos:gd-devel, p-cpe:/a:centos:centos:gd-progs, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/02/29

Vulnerability Publication Date: 2006/08/31

Reference Information

CVE: CVE-2006-4484, CVE-2007-0455, CVE-2007-2756, CVE-2007-3472, CVE-2007-3473, CVE-2007-3475, CVE-2007-3476

BID: 19582, 24089, 24651

RHSA: 2008:0146

CWE: 119, 189