CVE-2007-3996
Publication date 4 September 2007
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
Status
Package | Ubuntu Release | Status |
---|---|---|
libgd2 | 8.10 intrepid |
Not affected
|
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy |
Fixed 2.0.34-1ubuntu1.1
|
|
7.04 feisty |
Fixed 2.0.34~rc1-2ubuntu1.2
|
|
6.10 edgy |
Fixed 2.0.33-4ubuntu2.2
|
|
6.06 LTS dapper |
Fixed 2.0.33-2ubuntu5.3
|
|
php5 | 8.10 intrepid |
Not affected
|
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy |
Fixed 5.2.3-1ubuntu6.5
|
|
7.04 feisty | Ignored end of life, was needed | |
6.10 edgy | Ignored end of life, was needed | |
6.06 LTS dapper |
Fixed 5.1.2-1ubuntu3.13
|
Notes
jdstrand
note this is gdImageCreate and gdImageCreateTrueColor dapper-gutsy libgd2 are affected to varying degrees php5-gd segfaults on feisty and gutsy before patching libgd2, and dapper-gutsy segfault after (this is because feisty-gutsy had a partial fix already in libgd2). php5-gd is not handling the error condition when libgd2 fails properly. Verified that 5.2.4 works with patched libgd2.
Patch details
Package | Patch details |
---|---|
php5 |