Red Hat Bugzilla – Bug 234312
CVE-2007-0455 gd buffer overrun
Last modified: 2007-11-30 17:07:43 EST
+++ This bug was initially created as a clone of Bug #224607 +++
Kees Cook from Ubuntu reported a "off-the-end-of-string increment", which could
theoretically lead ot a buffer overflow.
This flaw would only be exploitable if a JIS-encoded font is used when
processing a special malicious string.
The issue here is that the NULL terminator is incremented, which could lead to
unknown results during the processing of the malicious string.
RCS file: /repository/gd/libgd/gdft.c,v
retrieving revision 1.28
diff -u -p -r1.28 gdft.c
--- gdft.c 3 Jan 2007 21:21:21 -0000 1.28
+++ gdft.c 24 Jan 2007 23:00:55 -0000
@@ -1178,7 +1178,7 @@ fprintf(stderr,"dpi=%d,%d metric_res=%d
ch = c & 0xFF; /* don't extend sign */
+ if (*next) next++;
-- Additional comment from firstname.lastname@example.org on 2007-01-26 12:44 EST --
This flaw does not affect gd as shipped in RHEL2.1 or RHEL3.
-- Additional comment from email@example.com on 2007-01-26 12:48 EST --
This flaw also affects RHEL5. Once we can assign bugs to that version, I'll
move this from RHEL4.
closing, use #224607 for tracking this issue. should we decide to have it fixed
in a future update we'll create tracking bugs with appropriate flags set.