Re: [USN-515-1] t1lib vulnerability
--10jrOL3x2xqLmOsH
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi,
On Fri, Sep 21, 2007 at 04:30:31PM +0400, 3APA3A wrote:
> CVE-2007-4033 is "Buffer overflow in php_gd2.dll in the gd (PHP_GD2)
> extension in PHP 5.2.3 allows context-dependent attackers to execute
> arbitrary code via a long argument to the imagepsloadfont function."
>=20
> Please, provide valid CVE entry.
>=20
> --Thursday, September 20, 2007, 12:18:02 AM, you wrote to ubuntu-security=
-announce@lists.ubuntu.com:
>=20
> KC> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20
> KC> Ubuntu Security Notice USN-515-1 September 19, 2007
> KC> t1lib vulnerability
> KC> CVE-2007-4033
> KC> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
That is the correct CVE -- the true cause of the gd2 issue was in t1lib,
not gd2:
http://www.securityfocus.com/bid/25079/info
-Kees
--=20
Kees Cook
--10jrOL3x2xqLmOsH
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFG8+DrH/9LqRcGPm0RAqwmAJ46UlMoccnxL/yZat9gBaNGjXqHRACdGC5Y
mDQZ4T1wHa5gEIV2lUR9c1g=
=coic
-----END PGP SIGNATURE-----
--10jrOL3x2xqLmOsH--
討論串 (同標題文章)