Mandriva Linux Security Advisory : gd (MDVSA-2008:038)

Low Nessus Plugin ID 37016


The remote Mandriva Linux host is missing one or more security updates.


Buffer overflow in the LWZReadByte() function in gd_gif_in.c in GD prior to 2.0.34 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

This was originally fixed in PHP's embedded GD with MDKSA-2006:162;
patches had not been applied to the system libgd at that time.

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Low

ID: 37016

File Name: mandriva_MDVSA-2008-038.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2009/04/23

Modified: 2016/05/17

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:gd-utils, p-cpe:/a:mandriva:linux:lib64gd2, p-cpe:/a:mandriva:linux:lib64gd2-devel, p-cpe:/a:mandriva:linux:lib64gd2-static-devel, p-cpe:/a:mandriva:linux:libgd2, p-cpe:/a:mandriva:linux:libgd2-devel, p-cpe:/a:mandriva:linux:libgd2-static-devel, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2008/02/07

Vulnerability Publication Date: 2006/08/17

Reference Information

CVE: CVE-2006-4484

BID: 19582

OSVDB: 28002

MDVSA: 2008:038