php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #30718 the libgd shipped with PHP needs to be updated
Submitted: 2004-11-08 13:06 UTC Modified: 2004-11-08 13:09 UTC
From: hunter at comsys dot com dot ua Assigned:
Status: Not a bug Package: GD related
PHP Version: Irrelevant OS: any
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: hunter at comsys dot com dot ua
New email:
PHP Version: OS:

 

 [2004-11-08 13:06 UTC] hunter at comsys dot com dot ua
Description:
------------
Integer overflow in GD Graphics Library (libgd) 2.0.28, and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function. 

The libgd library shipped with PHP is vulnerable.



Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2004-11-08 13:09 UTC] derick@php.net
This is not true. The integer overflow is not possible in PHP as we use a different function to allocate memory which checks for those overflows.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue May 14 12:01:32 2024 UTC