Red Hat Bugzilla – Bug 224610
CVE-2007-0455 gd buffer overrun
Last modified: 2007-11-30 17:11:54 EST
+++ This bug was initially created as a clone of Bug #224607 +++
Kees Cook from Ubuntu reported a "off-the-end-of-string increment", which could
theoretically lead ot a buffer overflow.
This flaw would only be exploitable if a JIS-encoded font is used when
processing a special malicious string.
The issue here is that the NULL terminator is incremented, which could lead to
unknown results during the processing of the malicious string.
RCS file: /repository/gd/libgd/gdft.c,v
retrieving revision 1.28
diff -u -p -r1.28 gdft.c
--- gdft.c 3 Jan 2007 21:21:21 -0000 1.28
+++ gdft.c 24 Jan 2007 23:00:55 -0000
@@ -1178,7 +1178,7 @@ fprintf(stderr,"dpi=%d,%d metric_res=%d
ch = c & 0xFF; /* don't extend sign */
+ if (*next) next++;
This flaw also affects FC5
Fixed in gd-2.0.33-12.fc7 in devel branch (gd-2.0.33-10.fc6 - in fc6,
gd-2.0.33-7.fc5 in fc5)