php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #30718 the libgd shipped with PHP needs to be updated
Submitted: 2004-11-08 13:06 UTC Modified: 2004-11-08 13:09 UTC
From: hunter at comsys dot com dot ua Assigned:
Status: Not a bug Package: GD related
PHP Version: Irrelevant OS: any
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: hunter at comsys dot com dot ua
New email:
PHP Version: OS:

 

 [2004-11-08 13:06 UTC] hunter at comsys dot com dot ua
Description:
------------
Integer overflow in GD Graphics Library (libgd) 2.0.28, and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function. 

The libgd library shipped with PHP is vulnerable.



Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2004-11-08 13:09 UTC] derick@php.net
This is not true. The integer overflow is not possible in PHP as we use a different function to allocate memory which checks for those overflows.
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Fri May 09 21:01:27 2025 UTC