Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891651
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-1651-1)
Summary:The remote host is missing an update for the Debian 'libgd2' package(s) announced via the DLA-1651-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libgd2' package(s) announced via the DLA-1651-1 advisory.

Vulnerability Insight:
Several issues in libgd2, a graphics library that allows to quickly draw images, have been found.

CVE-2019-6977

A potential double free in gdImage*Ptr() has been reported by Solmaz Salimi (aka. Rooney).

CVE-2019-6978

Simon Scannell found a heap-based buffer overflow, exploitable with crafted image data.

CVE-2018-1000222

A new double free vulnerabilities in gdImageBmpPtr() has been reported by Solmaz Salimi (aka. Rooney).

CVE-2018-5711

Due to an integer signedness error the GIF core parsing function can enter an infinite loop. This will lead to a Denial of Service and exhausted server resources.

For Debian 8 Jessie, these problems have been fixed in version 2.1.0-5+deb8u12.

We recommend that you upgrade your libgd2 packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'libgd2' package(s) on Debian 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-1000222
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
https://security.gentoo.org/glsa/201903-18
https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html
https://usn.ubuntu.com/3755-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-5711
https://www.oracle.com/security-alerts/cpuapr2020.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00022.html
RedHat Security Advisories: RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2018:1296
RedHat Security Advisories: RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:2519
Common Vulnerability Exposure (CVE) ID: CVE-2019-6977
BugTraq ID: 106731
http://www.securityfocus.com/bid/106731
Debian Security Information: DSA-4384 (Google Search)
https://www.debian.org/security/2019/dsa-4384
https://www.exploit-db.com/exploits/46677/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/
http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://bugs.php.net/bug.php?id=77270
RedHat Security Advisories: RHSA-2019:3299
https://access.redhat.com/errata/RHSA-2019:3299
SuSE Security Announcement: openSUSE-SU-2019:1140 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
SuSE Security Announcement: openSUSE-SU-2019:1148 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
https://usn.ubuntu.com/3900-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-6978
https://github.com/libgd/libgd/commit/553702980ae89c83f2d6e254d62cf82e204956d0
https://github.com/libgd/libgd/issues/492
https://github.com/php/php-src/commit/089f7c0bc28d399b0420aa6ef058e4c1c120b2ae
RedHat Security Advisories: RHSA-2019:2722
https://access.redhat.com/errata/RHSA-2019:2722
CopyrightCopyright (C) 2019 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.