exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 21186

Secunia Security Advisory 21186
Posted Jul 26, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libgd2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) against applications and services using libgd2.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 88bba18a82be7acc9c5f96e9b47e9b15cc1b6209d5ab40e20660746324c86751

Secunia Security Advisory 21186

Change Mirror Download


----------------------------------------------------------------------

Hardcore Disassembler / Reverse Engineer Wanted!

Want to work with IDA and BinDiff?
Want to write PoC's and Exploits?

Your nationality is not important.
We will get you a work permit, find an apartment, and offer a
relocation compensation package.

http://secunia.com/hardcore_disassembler_and_reverse_engineer/

----------------------------------------------------------------------

TITLE:
Debian update for libgd2

SECUNIA ADVISORY ID:
SA21186

VERIFY ADVISORY:
http://secunia.com/advisories/21186/

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for libgd2. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) against applications and services using libgd2.

For more information:
SA20500

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1.dsc
Size/MD5 checksum: 885 e389163781898504ec6e8e0018cd1fdd
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1.diff.gz
Size/MD5 checksum: 260955 50e0aa54bda19f06041d78a5771c7fd1
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33.orig.tar.gz
Size/MD5 checksum: 587617 be0a6d326cd8567e736fbc75df0a5c45

Architecture independent components:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-dev_2.0.33-1.1sarge1_all.deb
Size/MD5 checksum: 128526 bcaaacf60733a35002b999f8851ce3a7
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2_2.0.33-1.1sarge1_all.deb
Size/MD5 checksum: 128500 4ef28350291c173754332cc61cb54ba1

Alpha architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_alpha.deb
Size/MD5 checksum: 144914 65aa478f07315cb7e62ac6d91177b96d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_alpha.deb
Size/MD5 checksum: 206668 8cded1b036579ebc7c62f1ac37824ac6
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_alpha.deb
Size/MD5 checksum: 357800 cc21def16f0e514da5d34c2f513b3daf
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_alpha.deb
Size/MD5 checksum: 208490 fa17839a6953dbd709eda8783be6ead1
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_alpha.deb
Size/MD5 checksum: 362160 0be347a2217d06fe7ef36b002ea7c9ca

AMD64 architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_amd64.deb
Size/MD5 checksum: 141774 1f54d14b016a5ad132998ff669226244
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_amd64.deb
Size/MD5 checksum: 196436 6ff8e6d85237e34ddd12c9aea85bd314
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_amd64.deb
Size/MD5 checksum: 337310 bfd77a6cdc6aaa1c64d6c4be1a8acea8
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_amd64.deb
Size/MD5 checksum: 198932 a084415f7c3dfc684569d626dd80aacb
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_amd64.deb
Size/MD5 checksum: 340294 8fdc6f33e6253346c4f853db61501a21

ARM architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_arm.deb
Size/MD5 checksum: 141374 b157ca4d44fffd20740c162535ca9e3f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_arm.deb
Size/MD5 checksum: 188664 5b3a0e8dcb02e3fa83cb8a618a57c456
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_arm.deb
Size/MD5 checksum: 334316 74999431b3008c7f4820d0405a236c0f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_arm.deb
Size/MD5 checksum: 191308 b29466e1a38e863dce0b1cdb535e3cfc
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_arm.deb
Size/MD5 checksum: 337536 761e0550e4d9343d2056dba350c1cd1f

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_i386.deb
Size/MD5 checksum: 141786 1cc957c1d1cb93e2d80c85d0c84dcfd1
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_i386.deb
Size/MD5 checksum: 191932 f66bc591f047503e80d107458e938416
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_i386.deb
Size/MD5 checksum: 328576 27953838b048aab48d4eee40fc630f6f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_i386.deb
Size/MD5 checksum: 193690 580d72764e8b331f9be599b45894497d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_i386.deb
Size/MD5 checksum: 330848 0c980ae4c5a0e93725175e69c7d8176f

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_ia64.deb
Size/MD5 checksum: 146290 a07f3ae8f234ca3e3b5e81eebf3c446d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_ia64.deb
Size/MD5 checksum: 224272 c057fe07156af1945b9eab8909a28bec
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_ia64.deb
Size/MD5 checksum: 370376 6f8485a4f4d916d75dc21b20a113ad98
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_ia64.deb
Size/MD5 checksum: 227040 4983686be756f0fdd7ab03cf1cc9c195
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_ia64.deb
Size/MD5 checksum: 373400 896aaaaec2747772779073c837fe2d84

HP Precision architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_hppa.deb
Size/MD5 checksum: 143562 c4223c693e1a24336ddab5a92e3d019b
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_hppa.deb
Size/MD5 checksum: 204504 371343c96979ae3b6688a9471333dd20
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_hppa.deb
Size/MD5 checksum: 345608 267ea3ea2dedc6b7d1b991821eff0327
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_hppa.deb
Size/MD5 checksum: 207026 ad942c88f11286a44e9aac850fb10a3a
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_hppa.deb
Size/MD5 checksum: 348272 926ac97ade522d92be98fd0035536c45

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_m68k.deb
Size/MD5 checksum: 141456 1477bf288e99fa9bdf1640c828d7f1a5
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_m68k.deb
Size/MD5 checksum: 184864 9cde2fe10257ecaf581300e024dd7f0c
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_m68k.deb
Size/MD5 checksum: 323520 634a13523c02c7b831228c128fe320c8
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_m68k.deb
Size/MD5 checksum: 187018 b6fcadf304e52fa9e57ceb168e495156
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_m68k.deb
Size/MD5 checksum: 325634 44468789f4014425c7c84c62fdb07914

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_mips.deb
Size/MD5 checksum: 155774 5af80762b00f46f1f9fdc46a78941191
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_mips.deb
Size/MD5 checksum: 195396 c10d28c9f999639745c04889c0581516
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_mips.deb
Size/MD5 checksum: 344960 0b3bc47908a4f25ebb58b27c5e6fa730
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_mips.deb
Size/MD5 checksum: 198016 9fe5be1930a8f9ff4ab15b09aff626fb
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_mips.deb
Size/MD5 checksum: 347410 da9fb9aeb4c9891cb5dec62ca9263aaa

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_mipsel.deb
Size/MD5 checksum: 155772 58c478bc430bd49cece6e748218e6200
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_mipsel.deb
Size/MD5 checksum: 195330 ca975af25d3362ce4a4c9e19b1d27b50
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_mipsel.deb
Size/MD5 checksum: 344992 096e665346647e297e943684e7222e5f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_mipsel.deb
Size/MD5 checksum: 197846 660f0ba2f884e249d5ffd7302f398a01
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_mipsel.deb
Size/MD5 checksum: 347270 69c4a6744e74455997a8228566a47f00

PowerPC architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_powerpc.deb
Size/MD5 checksum: 150276 46c99b85b1faf609147cc111b747841d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_powerpc.deb
Size/MD5 checksum: 198830 c8168aa92f4008e2943893fa5ccae820
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_powerpc.deb
Size/MD5 checksum: 341538 505e633e80f425c8b9422e83997ac07c
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_powerpc.deb
Size/MD5 checksum: 200916 16d8a96a3fc3b28a7355680fedaef3e8
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_powerpc.deb
Size/MD5 checksum: 344206 47c92a9a5bbc22637f5fee0223034a97

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_s390.deb
Size/MD5 checksum: 142414 a30ad94d6ca809d519a088771b31fc1d
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_s390.deb
Size/MD5 checksum: 199456 c99ca505a026d2b7b01dea1eaeebc4a5
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_s390.deb
Size/MD5 checksum: 337702 c45bca23bef2f03a03a6e07e37757281
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_s390.deb
Size/MD5 checksum: 202030 34639f38ecfed22b1b1887a918516dce
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_s390.deb
Size/MD5 checksum: 341264 c510662e0889b70e73b8e76c568009e6

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/libg/libgd2/libgd-tools_2.0.33-1.1sarge1_sparc.deb
Size/MD5 checksum: 141382 71ccad065f8a4a21ee8337537e732b90
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm_2.0.33-1.1sarge1_sparc.deb
Size/MD5 checksum: 191428 aa0a6d650fb2eb6322d2582f7489ed73
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-noxpm-dev_2.0.33-1.1sarge1_sparc.deb
Size/MD5 checksum: 332436 26d15a5c68f2a47a5eccf4ba3b4980fb
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm_2.0.33-1.1sarge1_sparc.deb
Size/MD5 checksum: 194072 95aa9e357d5dd4f0105e1f7888b9bb4f
http://security.debian.org/pool/updates/main/libg/libgd2/libgd2-xpm-dev_2.0.33-1.1sarge1_sparc.deb
Size/MD5 checksum: 334118 a6d05fae692cd60c72b231a78230a38a

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2.0.33-5.

ORIGINAL ADVISORY:
http://www.us.debian.org/security/2006/dsa-1117

OTHER REFERENCES:
SA20500:
http://secunia.com/advisories/20500/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close