Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66296
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1936-1)
Summary:The remote host is missing an update for the Debian 'libgd2' package(s) announced via the DSA-1936-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libgd2' package(s) announced via the DSA-1936-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in libgd2, a library for programmatic graphics creation and manipulation. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-0455

Kees Cook discovered a buffer overflow in libgd2's font renderer. An attacker could cause denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font. This issue only affects the oldstable distribution (etch).

CVE-2009-3546

Tomas Hoger discovered a boundary error in the '_gdGetColors()' function. An attacker could conduct a buffer overflow or buffer over-read attacks via a crafted GD file.

For the oldstable distribution (etch), these problems have been fixed in version 2.0.33-5.2etch2.

For the stable distribution (lenny), these problems have been fixed in version 2.0.36~
rc1~
dfsg-3+lenny1.

For the upcoming stable distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 2.0.36~
rc1~
dfsg-3.1.

We recommend that you upgrade your libgd2 packages.

Affected Software/OS:
'libgd2' package(s) on Debian 4, Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0455
2007-0007
http://www.trustix.org/errata/2007/0007
20070418 rPSA-2007-0073-1 php php-mysql php-pgsql
http://www.securityfocus.com/archive/1/466166/100/0/threaded
22289
http://www.securityfocus.com/bid/22289
23916
http://secunia.com/advisories/23916
24022
http://secunia.com/advisories/24022
24052
http://secunia.com/advisories/24052
24053
http://secunia.com/advisories/24053
24107
http://secunia.com/advisories/24107
24143
http://secunia.com/advisories/24143
24151
http://secunia.com/advisories/24151
24924
http://secunia.com/advisories/24924
24945
http://secunia.com/advisories/24945
24965
http://secunia.com/advisories/24965
25575
http://secunia.com/advisories/25575
29157
http://secunia.com/advisories/29157
42813
http://secunia.com/advisories/42813
ADV-2007-0400
http://www.vupen.com/english/advisories/2007/0400
ADV-2011-0022
http://www.vupen.com/english/advisories/2011/0022
FEDORA-2007-150
http://fedoranews.org/cms/node/2631
FEDORA-2010-19022
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
FEDORA-2010-19033
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
MDKSA-2007:035
http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
MDKSA-2007:036
http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
MDKSA-2007:038
http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
MDKSA-2007:109
http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
RHSA-2007:0153
http://www.redhat.com/support/errata/RHSA-2007-0153.html
RHSA-2007:0155
http://rhn.redhat.com/errata/RHSA-2007-0155.html
RHSA-2007:0162
http://www.redhat.com/support/errata/RHSA-2007-0162.html
RHSA-2008:0146
http://www.redhat.com/support/errata/RHSA-2008-0146.html
USN-473-1
http://www.ubuntu.com/usn/usn-473-1
[security-announce] 20070208 rPSA-2007-0028-1 gd
http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607
https://issues.rpath.com/browse/RPL-1030
https://issues.rpath.com/browse/RPL-1268
oval:org.mitre.oval:def:11303
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303
Common Vulnerability Exposure (CVE) ID: CVE-2009-3546
36712
http://www.securityfocus.com/bid/36712
37069
http://secunia.com/advisories/37069
37080
http://secunia.com/advisories/37080
38055
http://secunia.com/advisories/38055
ADV-2009-2929
http://www.vupen.com/english/advisories/2009/2929
ADV-2009-2930
http://www.vupen.com/english/advisories/2009/2930
MDVSA-2009:285
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
RHSA-2010:0003
http://www.redhat.com/support/errata/RHSA-2010-0003.html
[oss-security] 20091015 Re: CVE Request -- PHP 5 - 5.2.11
http://marc.info/?l=oss-security&m=125562113503923&w=2
[oss-security] 20091120 Re: CVE request: php 5.3.1 update
http://www.openwall.com/lists/oss-security/2009/11/20/5
http://svn.php.net/viewvc?view=revision&revision=289557
oval:org.mitre.oval:def:11199
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.