Bug 277221 (CVE-2007-3477) - CVE-2007-3477 gd: arc drawing functions can consume large amount of CPU time
Summary: CVE-2007-3477 gd: arc drawing functions can consume large amount of CPU time
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2007-3477
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On: 277411 277421
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-09-04 19:48 UTC by Lubomir Kundrak
Modified: 2019-09-29 12:21 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-02-13 12:57:53 UTC


Attachments (Terms of Use)

Description Lubomir Kundrak 2007-09-04 19:48:17 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-3477 to the following vulnerability:

The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.

References:

http://www.libgd.org/ReleaseNote020035
http://bugs.libgd.org/?do=details&task_id=74
http://bugs.libgd.org/?do=details&task_id=92

Comment 2 Tomas Hoger 2008-02-11 15:37:14 UTC
Original fix:

http://cvs.php.net/viewcvs.cgi/gd/libgd/src/gd.c?r1=1.53&r2=1.54

and additional enhancement to fix regression introduced by the original fix:

http://cvs.php.net/viewcvs.cgi/gd/libgd/src/gd.c?r1=1.58&r2=1.59

Comment 3 Tomas Hoger 2008-02-13 12:50:28 UTC
Due to minimal impact of this flaw (temporary DoS by high CPU usage) and low
likelihood of this problem being exposed in a way that would allow trust
boundary crossing, we currently do not plan to backport fix for this issue to
versions of gd shipped in current versions of Red Hat Enterprise Linux.


Note You need to log in before you can comment on or make changes to this bug.