CVE-2006-4484

CVE Details

Release Date:2006-08-31

Description


Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

See more information about CVE-2006-4484 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 2.6 Base Metrics: AV:N/AC:H/Au:N/C:N/I:N/A:P
Access Vector: Network Attack Complexity: High
Authentication: None required Confidentiality Impact: None
Integrity Impact: None Availability Impact: Partial

Errata information


PlatformErrataRelease Date
Oracle Enterprise Linux version 4 (gd)ELSA-2008-01462008-02-28
Oracle Enterprise Linux version 4 (php)ELSA-2006-06692006-11-30
Oracle Linux version 5 (gd)ELSA-2008-01462008-02-28



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete