Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607 Issue Tracking Third Party Advisory
http://fedoranews.org/cms/node/2631 Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html Mailing List Third Party Advisory
http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html Broken Link
http://rhn.redhat.com/errata/RHSA-2007-0155.html Third Party Advisory
http://secunia.com/advisories/23916 Not Applicable Vendor Advisory
http://secunia.com/advisories/24022 Not Applicable
http://secunia.com/advisories/24052 Not Applicable
http://secunia.com/advisories/24053 Not Applicable
http://secunia.com/advisories/24107 Not Applicable
http://secunia.com/advisories/24143 Not Applicable
http://secunia.com/advisories/24151 Not Applicable
http://secunia.com/advisories/24924 Not Applicable
http://secunia.com/advisories/24945 Not Applicable
http://secunia.com/advisories/24965 Not Applicable
http://secunia.com/advisories/25575 Not Applicable
http://secunia.com/advisories/29157 Not Applicable
http://secunia.com/advisories/42813 Not Applicable
http://www.mandriva.com/security/advisories?name=MDKSA-2007:035 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:036 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:038 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:109 Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0153.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0162.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0146.html Third Party Advisory
http://www.securityfocus.com/archive/1/466166/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/22289 Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0007 Broken Link
http://www.ubuntu.com/usn/usn-473-1 Third Party Advisory
http://www.vupen.com/english/advisories/2007/0400 Permissions Required
http://www.vupen.com/english/advisories/2011/0022 Permissions Required
https://issues.rpath.com/browse/RPL-1030 Broken Link
https://issues.rpath.com/browse/RPL-1268 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2007-01-30T17:00:00

Updated: 2018-10-16T14:57:01

Reserved: 2007-01-23T00:00:00


Link: CVE-2007-0455

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2007-01-30T17:28:00.000

Modified: 2022-07-21T15:17:50.720


Link: CVE-2007-0455

JSON object: View

cve-icon Redhat Information

No data.

CWE