News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
PHP "gdPngReadData()" Truncated PNG Data Denial of Service
May 22, 2007 @ 11:09:00

Secunia has posted this new advisory today about an issue with the GD graphics library functionality in PHP that could be used to cause a Denial of Service via a truncated PNG image.

The vulnerability is caused due to the incorrect use of libpng within the function "gdPngReadData()" in ext/gd/libgd/gd_png.c of the GD extension when processing truncated data. This can be exploited to cause an infinite loop by e.g. tricking an application to process a specially crafted file. (reported by Xavier Roche)

This issue has been confirmed in PHP versions 4.4.7 and 5.2.2 but may affect others. The issue has already been corrected, however, and can be fetched from the PHP CVS system to protect your system.

0 comments voice your opinion now!
gd image png truncate denialofservice secunia gdpngreaddata gd image png truncate denialofservice secunia gdpngreaddata


blog comments powered by Disqus

Similar Posts

Secunia: rPath Update for gd and Multiple php Packages

Community News: KenRadio.com Site Hacked (uses PHP-Nuke)

Sameer Borate's Blog: Generating a color palette from a image in php

Pierre-Alain Joye's Blog: Release Announcements (GD, Hidef, and Zip)

Secunia.com: Mambo Unspecified Bypass Vulnerabilities


Community Events





Don't see your event here?
Let us know!


podcast package framework api introduction community laravel series list bugfix interview tips voicesoftheelephpant opinion library deployment release language symfony install

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework