CVE-2017-6362
CVSS5.0
发布时间 :2017-09-07 09:29:00
修订时间 :2017-09-13 13:46:27
NMP    

[原文]Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-415 [双重释放]

- CPE (受影响的平台与产品)

cpe:/o:debian:debian_linux:8.0
cpe:/o:debian:debian_linux:9.0
cpe:/a:libgd:libgd:2.2.4
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
cpe:/o:fedoraproject:fedora:26

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6362
(官方数据源) NVD

- 其它链接及资源

http://www.debian.org/security/2017/dsa-3961
(VENDOR_ADVISORY)  DEBIAN  DSA-3961
https://github.com/libgd/libgd/issues/381
(VENDOR_ADVISORY)  CONFIRM  https://github.com/libgd/libgd/issues/381
https://github.com/libgd/libgd/releases/tag/gd-2.2.5
(VENDOR_ADVISORY)  CONFIRM  https://github.com/libgd/libgd/releases/tag/gd-2.2.5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/
(VENDOR_ADVISORY)  FEDORA  FEDORA-2017-7cc0e6a5f5

- 漏洞信息 (F144005)

Debian Security Advisory 3961-1 (PacketStormID:F144005)
2017-09-05 00:00:00
Debian  debian.org
advisory,denial of service,arbitrary
linux,debian
CVE-2017-6362
[点击下载]

Debian Linux Security Advisory 3961-1 - A double-free vulnerability was discovered in the gdImagePngPtr() function in libgd2, a library for programmatic graphics creation and manipulation, which may result in denial of service or potentially the execution of arbitrary code if a specially crafted file is processed.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3961-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
September 03, 2017                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libgd2
CVE ID         : CVE-2017-6362

A double-free vulnerability was discovered in the gdImagePngPtr()
function in libgd2, a library for programmatic graphics creation and
manipulation, which may result in denial of service or potentially the
execution of arbitrary code if a specially crafted file is processed.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.0-5+deb8u11.

For the stable distribution (stretch), this problem has been fixed in
version 2.2.4-2+deb9u2.

For the unstable distribution (sid), this problem has been fixed in
version 2.2.5-1.

We recommend that you upgrade your libgd2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=uz5S
-----END PGP SIGNATURE-----
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站