Re: [USN-515-1] t1lib vulnerability

看板Bugtraq作者時間18年前 (2007/09/22 02:40), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/3 (看更多)
--10jrOL3x2xqLmOsH Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, On Fri, Sep 21, 2007 at 04:30:31PM +0400, 3APA3A wrote: > CVE-2007-4033 is "Buffer overflow in php_gd2.dll in the gd (PHP_GD2) > extension in PHP 5.2.3 allows context-dependent attackers to execute > arbitrary code via a long argument to the imagepsloadfont function." >=20 > Please, provide valid CVE entry. >=20 > --Thursday, September 20, 2007, 12:18:02 AM, you wrote to ubuntu-security= -announce@lists.ubuntu.com: >=20 > KC> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20 > KC> Ubuntu Security Notice USN-515-1 September 19, 2007 > KC> t1lib vulnerability > KC> CVE-2007-4033 > KC> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D That is the correct CVE -- the true cause of the gd2 issue was in t1lib, not gd2: http://www.securityfocus.com/bid/25079/info -Kees --=20 Kees Cook --10jrOL3x2xqLmOsH Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFG8+DrH/9LqRcGPm0RAqwmAJ46UlMoccnxL/yZat9gBaNGjXqHRACdGC5Y mDQZ4T1wHa5gEIV2lUR9c1g= =coic -----END PGP SIGNATURE----- --10jrOL3x2xqLmOsH--
文章代碼(AID): #16z10j00 (Bugtraq)
文章代碼(AID): #16z10j00 (Bugtraq)