CVE-2006-2906
CVSS5.4
发布时间 :2006-06-08 12:06:00
修订时间 :2011-03-07 21:37:16
NMCOPS    

[原文]The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.


[CNNVD]Thomas Boutell graphics draw library gdImageCreateFromGifPtr 函数 拒绝服务攻击漏洞(CNNVD-200606-190)

        Thomas Boutell图形绘制(GD)的图书馆(又名的libgd)2.0.33的gdImageCreateFromGifPtr LZW 压缩功能的解码,远程攻击者通过畸形的GIF数据,导致一个无限循环,造成拒绝服务(CPU消耗)。

- CVSS (基础分值)

CVSS分值: 5.4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2906
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-190
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/2174
(UNKNOWN)  VUPEN  ADV-2006-2174
http://www.securityfocus.com/bid/18294
(UNKNOWN)  BID  18294
http://www.securityfocus.com/archive/1/436132
(UNKNOWN)  BUGTRAQ  20060606 libgd 2.0.33 infinite loop in GIF decoding ?
http://secunia.com/advisories/20500
(VENDOR_ADVISORY)  SECUNIA  20500
https://issues.rpath.com/browse/RPL-939
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-939
http://xforce.iss.net/xforce/xfdb/26976
(UNKNOWN)  XF  gdgraphicslibrary-gif-dos(26976)
http://www.ubuntulinux.org/support/documentation/usn/usn-298-1
(UNKNOWN)  UBUNTU  USN-298-1
http://www.trustix.org/errata/2006/0038
(UNKNOWN)  TRUSTIX  2006-0038
http://www.novell.com/linux/security/advisories/2006_31_php.html
(UNKNOWN)  SUSE  SUSE-SA:2006:031
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
(UNKNOWN)  MANDRIVA  MDKSA-2006:122
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
(UNKNOWN)  MANDRIVA  MDKSA-2006:113
http://www.mandriva.com/security/advisories?name=MDKSA-2006:112
(UNKNOWN)  MANDRIVA  MDKSA-2006:112
http://www.debian.org/security/2006/dsa-1117
(UNKNOWN)  DEBIAN  DSA-1117
http://securityreason.com/securityalert/1067
(UNKNOWN)  SREASON  1067
http://secunia.com/advisories/23783
(UNKNOWN)  SECUNIA  23783
http://secunia.com/advisories/21186
(UNKNOWN)  SECUNIA  21186
http://secunia.com/advisories/21050
(UNKNOWN)  SECUNIA  21050
http://secunia.com/advisories/20887
(UNKNOWN)  SECUNIA  20887
http://secunia.com/advisories/20866
(UNKNOWN)  SECUNIA  20866
http://secunia.com/advisories/20853
(UNKNOWN)  SECUNIA  20853
http://secunia.com/advisories/20676
(UNKNOWN)  SECUNIA  20676
http://secunia.com/advisories/20571
(UNKNOWN)  SECUNIA  20571

- 漏洞信息

Thomas Boutell graphics draw library gdImageCreateFromGifPtr 函数 拒绝服务攻击漏洞
中危 设计错误
2006-06-08 00:00:00 2006-06-08 00:00:00
远程※本地  
        Thomas Boutell图形绘制(GD)的图书馆(又名的libgd)2.0.33的gdImageCreateFromGifPtr LZW 压缩功能的解码,远程攻击者通过畸形的GIF数据,导致一个无限循环,造成拒绝服务(CPU消耗)。

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 禁用JavaScript支持;
        * 在访问不可信任站点时不要输入可疑文本。
        厂商补丁:
        Microsoft
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.microsoft.com/windows/ie/default.asp

        Mozilla
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.mozilla.org/

- 漏洞信息 (F48466)

Debian Linux Security Advisory 1117-1 (PacketStormID:F48466)
2006-07-24 00:00:00
Debian  debian.org
advisory,denial of service
linux,debian
CVE-2006-2906
[点击下载]

Debian Security Advisory 1117-1 - It was discovered that the GD graphics library performs insufficient checks of the validity of GIF images, which might lead to denial of service by tricking the application into an infinite loop.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1117-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
July 21st, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libgd2
Vulnerability  : insufficient input sanitising
Problem-Type   : local(remote)
Debian-specific: no
CVE ID         : CVE-2006-2906
Debian Bug     : 372912

It was discoverd that the GD graphics library performs insufficient checks
of the validity of GIF images, which might lead to denial of service by
tricking the application into an infinite loop.

For the stable distribution (sarge) this problem has been fixed in
version 2.0.33-1.1sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.0.33-5.

We recommend that you upgrade your libgd2 packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1.dsc
      Size/MD5 checksum:      885 e389163781898504ec6e8e0018cd1fdd
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1.diff.gz
      Size/MD5 checksum:   260955 50e0aa54bda19f06041d78a5771c7fd1
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
      Size/MD5 checksum:   587617 be0a6d326cd8567e736fbc75df0a5c45

  Architecture independent components:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.33-1.1sarge1_all.deb
      Size/MD5 checksum:   128526 bcaaacf60733a35002b999f8851ce3a7
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1_all.deb
      Size/MD5 checksum:   128500 4ef28350291c173754332cc61cb54ba1

  Alpha architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_alpha.deb
      Size/MD5 checksum:   144914 65aa478f07315cb7e62ac6d91177b96d
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_alpha.deb
      Size/MD5 checksum:   206668 8cded1b036579ebc7c62f1ac37824ac6
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_alpha.deb
      Size/MD5 checksum:   357800 cc21def16f0e514da5d34c2f513b3daf
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_alpha.deb
      Size/MD5 checksum:   208490 fa17839a6953dbd709eda8783be6ead1
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_alpha.deb
      Size/MD5 checksum:   362160 0be347a2217d06fe7ef36b002ea7c9ca

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_amd64.deb
      Size/MD5 checksum:   141774 1f54d14b016a5ad132998ff669226244
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_amd64.deb
      Size/MD5 checksum:   196436 6ff8e6d85237e34ddd12c9aea85bd314
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_amd64.deb
      Size/MD5 checksum:   337310 bfd77a6cdc6aaa1c64d6c4be1a8acea8
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_amd64.deb
      Size/MD5 checksum:   198932 a084415f7c3dfc684569d626dd80aacb
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_amd64.deb
      Size/MD5 checksum:   340294 8fdc6f33e6253346c4f853db61501a21

  ARM architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_arm.deb
      Size/MD5 checksum:   141374 b157ca4d44fffd20740c162535ca9e3f
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_arm.deb
      Size/MD5 checksum:   188664 5b3a0e8dcb02e3fa83cb8a618a57c456
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_arm.deb
      Size/MD5 checksum:   334316 74999431b3008c7f4820d0405a236c0f
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_arm.deb
      Size/MD5 checksum:   191308 b29466e1a38e863dce0b1cdb535e3cfc
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_arm.deb
      Size/MD5 checksum:   337536 761e0550e4d9343d2056dba350c1cd1f

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_i386.deb
      Size/MD5 checksum:   141786 1cc957c1d1cb93e2d80c85d0c84dcfd1
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_i386.deb
      Size/MD5 checksum:   191932 f66bc591f047503e80d107458e938416
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_i386.deb
      Size/MD5 checksum:   328576 27953838b048aab48d4eee40fc630f6f
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_i386.deb
      Size/MD5 checksum:   193690 580d72764e8b331f9be599b45894497d
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_i386.deb
      Size/MD5 checksum:   330848 0c980ae4c5a0e93725175e69c7d8176f

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_ia64.deb
      Size/MD5 checksum:   146290 a07f3ae8f234ca3e3b5e81eebf3c446d
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_ia64.deb
      Size/MD5 checksum:   224272 c057fe07156af1945b9eab8909a28bec
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_ia64.deb
      Size/MD5 checksum:   370376 6f8485a4f4d916d75dc21b20a113ad98
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_ia64.deb
      Size/MD5 checksum:   227040 4983686be756f0fdd7ab03cf1cc9c195
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_ia64.deb
      Size/MD5 checksum:   373400 896aaaaec2747772779073c837fe2d84

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_hppa.deb
      Size/MD5 checksum:   143562 c4223c693e1a24336ddab5a92e3d019b
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_hppa.deb
      Size/MD5 checksum:   204504 371343c96979ae3b6688a9471333dd20
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_hppa.deb
      Size/MD5 checksum:   345608 267ea3ea2dedc6b7d1b991821eff0327
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_hppa.deb
      Size/MD5 checksum:   207026 ad942c88f11286a44e9aac850fb10a3a
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_hppa.deb
      Size/MD5 checksum:   348272 926ac97ade522d92be98fd0035536c45

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_m68k.deb
      Size/MD5 checksum:   141456 1477bf288e99fa9bdf1640c828d7f1a5
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_m68k.deb
      Size/MD5 checksum:   184864 9cde2fe10257ecaf581300e024dd7f0c
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_m68k.deb
      Size/MD5 checksum:   323520 634a13523c02c7b831228c128fe320c8
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_m68k.deb
      Size/MD5 checksum:   187018 b6fcadf304e52fa9e57ceb168e495156
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_m68k.deb
      Size/MD5 checksum:   325634 44468789f4014425c7c84c62fdb07914

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_mips.deb
      Size/MD5 checksum:   155774 5af80762b00f46f1f9fdc46a78941191
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_mips.deb
      Size/MD5 checksum:   195396 c10d28c9f999639745c04889c0581516
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_mips.deb
      Size/MD5 checksum:   344960 0b3bc47908a4f25ebb58b27c5e6fa730
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_mips.deb
      Size/MD5 checksum:   198016 9fe5be1930a8f9ff4ab15b09aff626fb
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_mips.deb
      Size/MD5 checksum:   347410 da9fb9aeb4c9891cb5dec62ca9263aaa

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_mipsel.deb
      Size/MD5 checksum:   155772 58c478bc430bd49cece6e748218e6200
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_mipsel.deb
      Size/MD5 checksum:   195330 ca975af25d3362ce4a4c9e19b1d27b50
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_mipsel.deb
      Size/MD5 checksum:   344992 096e665346647e297e943684e7222e5f
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_mipsel.deb
      Size/MD5 checksum:   197846 660f0ba2f884e249d5ffd7302f398a01
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_mipsel.deb
      Size/MD5 checksum:   347270 69c4a6744e74455997a8228566a47f00

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_powerpc.deb
      Size/MD5 checksum:   150276 46c99b85b1faf609147cc111b747841d
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_powerpc.deb
      Size/MD5 checksum:   198830 c8168aa92f4008e2943893fa5ccae820
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_powerpc.deb
      Size/MD5 checksum:   341538 505e633e80f425c8b9422e83997ac07c
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_powerpc.deb
      Size/MD5 checksum:   200916 16d8a96a3fc3b28a7355680fedaef3e8
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_powerpc.deb
      Size/MD5 checksum:   344206 47c92a9a5bbc22637f5fee0223034a97

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_s390.deb
      Size/MD5 checksum:   142414 a30ad94d6ca809d519a088771b31fc1d
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_s390.deb
      Size/MD5 checksum:   199456 c99ca505a026d2b7b01dea1eaeebc4a5
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_s390.deb
      Size/MD5 checksum:   337702 c45bca23bef2f03a03a6e07e37757281
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_s390.deb
      Size/MD5 checksum:   202030 34639f38ecfed22b1b1887a918516dce
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_s390.deb
      Size/MD5 checksum:   341264 c510662e0889b70e73b8e76c568009e6

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_sparc.deb
      Size/MD5 checksum:   141382 71ccad065f8a4a21ee8337537e732b90
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_sparc.deb
      Size/MD5 checksum:   191428 aa0a6d650fb2eb6322d2582f7489ed73
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_sparc.deb
      Size/MD5 checksum:   332436 26d15a5c68f2a47a5eccf4ba3b4980fb
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_sparc.deb
      Size/MD5 checksum:   194072 95aa9e357d5dd4f0105e1f7888b9bb4f
    http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_sparc.deb
      Size/MD5 checksum:   334118 a6d05fae692cd60c72b231a78230a38a


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEwP4VXm3vHE4uyloRAmsZAKDNNtLkk8pu74ItZ+FiwvNBCh8XtgCgodBY
aDbnxJJl5wHK/XslepqaJa0=
=vPD4
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F47533)

Ubuntu Security Notice 298-1 (PacketStormID:F47533)
2006-06-21 00:00:00
Ubuntu  ubuntu.com
advisory,remote,web,denial of service,perl,php
linux,ubuntu
CVE-2006-2906
[点击下载]

Ubuntu Security Notice 298-1 - Xavier Roche discovered that libgd's function for reading GIF image data did not sufficiently verify its validity. Specially crafted GIF images could cause an infinite loop which used up all available CPU resources. Since libgd is often used in PHP and Perl web applications, this could lead to a remote Denial of Service vulnerability.

=========================================================== 
Ubuntu Security Notice USN-298-1              June 13, 2006
libgd2 vulnerability
CVE-2006-2906
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libgd2-noxpm                   2.0.33-1.1ubuntu1.5.04
  libgd2-xpm                     2.0.33-1.1ubuntu1.5.04

Ubuntu 5.10:
  libgd2-noxpm                   2.0.33-1.1ubuntu1.5.10
  libgd2-xpm                     2.0.33-1.1ubuntu1.5.10

Ubuntu 6.06 LTS:
  libgd2-noxpm                   2.0.33-2ubuntu5.1
  libgd2-xpm                     2.0.33-2ubuntu5.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Xavier Roche discovered that libgd's function for reading GIF image
data did not sufficiently verify its validity. Specially crafted GIF
images could cause an infinite loop which used up all available CPU
resources. Since libgd is often used in PHP and Perl web applications,
this could lead to a remote Denial of Service vulnerability.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04.diff.gz
      Size/MD5:   259535 85c0f13b7f7ba029f629311c29708a0e
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04.dsc
      Size/MD5:      897 6e3fa540918cab2297fbdd77f87ea6c6
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
      Size/MD5:   587617 be0a6d326cd8567e736fbc75df0a5c45

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-1.1ubuntu1.5.04_all.deb
      Size/MD5:   128566 741f8358ae222a0ff9ff3e679e50e508
    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.04_all.deb
      Size/MD5:   128546 d1fd6ab0661d2cfeaca8dfd2cf2b4c29

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_amd64.deb
      Size/MD5:   142554 fc8552468de8c3ff44249eb8bd4f84a0
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_amd64.deb
      Size/MD5:   338004 8abf135ee9e18ebd575dc5c8af7458db
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_amd64.deb
      Size/MD5:   197030 d8836969867424381f0bd1c9e201bc8c
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_amd64.deb
      Size/MD5:   340906 81be91de25d223b9dfb3aeb7a4cbcece
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_amd64.deb
      Size/MD5:   199468 aca7a9bb0dd0b286eba82014d3cbb0b8

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_i386.deb
      Size/MD5:   141060 71c2e67f310a0641b83f73c801174f76
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_i386.deb
      Size/MD5:   329156 ee26bcd67da3925975e38fc73a26c71e
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_i386.deb
      Size/MD5:   190724 98e8381effd02adcbc4358cf6890a882
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_i386.deb
      Size/MD5:   330550 54689d29b260877e48c80d824cd384fe
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_i386.deb
      Size/MD5:   193258 53e97869e636c7ff19a03123bb50cf69

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.04_powerpc.deb
      Size/MD5:   150322 d47b3079e9403f954932b30b59ce2dc0
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.04_powerpc.deb
      Size/MD5:   341558 0b936726f765f2a43b76c128d9dbd1e1
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.04_powerpc.deb
      Size/MD5:   198802 cc4bdacf9c062630aa0abe0f603c21d7
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.04_powerpc.deb
      Size/MD5:   344204 36df75287c80b2bfe6ce6e055e316686
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.04_powerpc.deb
      Size/MD5:   200872 4986d671d0f86482e77fe8bfa9aa8570

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.10.diff.gz
      Size/MD5:   259538 2fe25e57080e57f04e996136400ce5ea
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.10.dsc
      Size/MD5:      897 b0bc5f5e7621b5d22e25b51c829691b2
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
      Size/MD5:   587617 be0a6d326cd8567e736fbc75df0a5c45

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-1.1ubuntu1.5.10_all.deb
      Size/MD5:   128614 a80b952d55d3b613c43f2377c4ff609a
    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-1.1ubuntu1.5.10_all.deb
      Size/MD5:   128598 e1dd73bd47a61f18fcbc87b69732d888

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.10_amd64.deb
      Size/MD5:   142034 5506ff14c3596c6e1b5626edd49d4e24
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.10_amd64.deb
      Size/MD5:   339856 dad8ac889e8d7d31d5baa1a548fe6cdc
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.10_amd64.deb
      Size/MD5:   198722 faf06f2f07dec2d2be64a12326960063
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.10_amd64.deb
      Size/MD5:   341700 a11b339f5816689c3e11ea09e7ec6e5e
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.10_amd64.deb
      Size/MD5:   200492 c438e2fd26e731a03b65a04620425a1c

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.10_i386.deb
      Size/MD5:   141228 a5964e70f6251e09fb3eacd04abaf09b
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.10_i386.deb
      Size/MD5:   329714 d4d19de1fccacfb980f554f45f17edfa
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.10_i386.deb
      Size/MD5:   191820 ede2bfb510890e79db42b3955d267d9d
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.10_i386.deb
      Size/MD5:   330542 a455e8499053ce7ccecc43d5d5172bbf
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.10_i386.deb
      Size/MD5:   193490 c4f8adc7781e6a9804ff3c61c953ab02

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-1.1ubuntu1.5.10_powerpc.deb
      Size/MD5:   150512 be558294bf97e07ce4edbd255e6dc823
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1ubuntu1.5.10_powerpc.deb
      Size/MD5:   340942 0e94071ee7e99d59f266974e09d8abd8
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1ubuntu1.5.10_powerpc.deb
      Size/MD5:   198898 e63ecd801b7eab04628bab0021e3bc17
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1ubuntu1.5.10_powerpc.deb
      Size/MD5:   342876 c9331ca003b0d3106c2d8164a01c9c53
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-1.1ubuntu1.5.10_powerpc.deb
      Size/MD5:   200400 cdc445bcc1bab8eddd77d77d8f335e93

Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-2ubuntu5.1.diff.gz
      Size/MD5:   256319 844263f2600763f5bce839ed87b300cb
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33-2ubuntu5.1.dsc
      Size/MD5:      967 b49061cd7ee4d1920ec4d98b41300258
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
      Size/MD5:   587617 be0a6d326cd8567e736fbc75df0a5c45

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-dev_2.0.33-2ubuntu5.1_all.deb
      Size/MD5:   129252 014cbe434b45fa636394bbb695995ce6
    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd2_2.0.33-2ubuntu5.1_all.deb
      Size/MD5:   129232 6b2cc0d4b6e9ed05977e137a43a263c3

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.1_amd64.deb
      Size/MD5:   142706 30511267d1dc92cd309282459ad8103f
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.1_amd64.deb
      Size/MD5:   340652 3fcd2e908c99d777c52fe6db237ec665
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.1_amd64.deb
      Size/MD5:   199526 1f1cbde5e0a7892e8da40241174fc0f8
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.1_amd64.deb
      Size/MD5:   342460 c46ca3765670f7cb18e7bdc46ad9eb82
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.1_amd64.deb
      Size/MD5:   201208 8c442dbc0de625f88de7c8c53dd01dd5

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.1_i386.deb
      Size/MD5:   141674 ffa2557f8301fc1cb58cd43258f15f71
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.1_i386.deb
      Size/MD5:   330368 180ecb6dba1e59da58ebdc5a41fa4c15
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.1_i386.deb
      Size/MD5:   192360 be430c30f093dc9caef1ad10029a0b11
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.1_i386.deb
      Size/MD5:   331192 3906f21c8fb193458aa75372ec9943ba
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.1_i386.deb
      Size/MD5:   194164 ac5bc80c4f259b4a4542f01ab3c163a3

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/universe/libg/libgd2/libgd-tools_2.0.33-2ubuntu5.1_powerpc.deb
      Size/MD5:   150838 f31a2cceec103f60dde86f2638b1515d
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-2ubuntu5.1_powerpc.deb
      Size/MD5:   341640 56793cc96d8d56549926ac3fea6a0a28
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-noxpm_2.0.33-2ubuntu5.1_powerpc.deb
      Size/MD5:   199554 a240b6f56e83254c4e19bb12ccd878e9
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm-dev_2.0.33-2ubuntu5.1_powerpc.deb
      Size/MD5:   343552 65867cdf60f1192c9efcad170961a6f1
    http://security.ubuntu.com/ubuntu/pool/main/libg/libgd2/libgd2-xpm_2.0.33-2ubuntu5.1_powerpc.deb
      Size/MD5:   201138 5308a316178a9600f265cb7d0138ab1a

    

- 漏洞信息

26260
GD Graphics Library gdImageCreateFromGifPtr() Function GIF Processing DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-06-06 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

GD Graphics Library Remote Denial of Service Vulnerability
Design Error 18294
Yes Yes
2006-06-06 12:00:00 2007-01-16 09:00:00
Discovery of this issue is credited to Xavier Roche <rocheml@httrack.com>.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
S.u.S.E. UnitedLinux 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
rPath rPath Linux 1
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
GD Graphics Library gdlib 2.0.33
+ Trustix Secure Linux 3.0.5
+ Trustix Secure Linux 3.0
+ Trustix Secure Linux 2.2
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1

- 漏洞讨论

The GD Graphics Library is prone to a denial-of-service vulnerability. Attackers can trigger an infinite-loop condition when the library tries to handle malformed image files.

This issue allows attackers to consume excessive CPU resources on computers that use the affected software. This may deny service to legitimate users.

GD version 2.0.33 is vulnerable to this issue; other versions may also be affected.

- 漏洞利用

The following exploit code is sufficient to demonstrate this issue:

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.commailto:vuldb@securityfocus.com.

Please see the referenced advisories for more information.


GD Graphics Library gdlib 2.0.33

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站