Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #1833

Closed
Open
Created Mar 14, 2024 by Administrator@rootMaintainer

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Numeric Errors

Created by: armorcodegithubpreprod[bot]

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Numeric Errors

Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream libwmf package.

Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.

References

  • BUGTRAQ
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • Debian Security Advisory
  • Debian Security Tracker
  • FEDORA
  • FEDORA
  • Fedora Security Announcement
  • Fedora Security Announcement
  • Gentoo Security Advisory
  • Gentoo Security Advisory
  • Gentoo Security Advisory
  • MISC
  • OSVDB
  • Oval Security
  • RedHat Bugzilla Bug
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Security Focus
  • SUSE
  • TRUSTIX
  • VUPEN

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream libwmf package.

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.

References

  • Debian Security Advisory
  • Debian Security Tracker
  • Gentoo Security Advisory
  • Gentoo Security Advisory
  • http://bugs.gentoo.org/show_bug.cgi?id=201546
  • http://securityreason.com/securityalert/3103
  • http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
  • http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
  • https://issues.rpath.com/browse/RPL-1693
  • https://issues.rpath.com/browse/RPL-1702
  • http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
  • https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
  • http://www.php.net/ChangeLog-5.php#5.2.4
  • http://www.php.net/releases/5_2_4.php
  • http://www.trustix.org/errata/2007/0026/
  • http://www.vupen.com/english/advisories/2007/3023
  • OpenSuse Security Announcement
  • Oval Security
  • RedHat Security Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Ubuntu Security Advisory
  • X-force Vulnerability Report
  • X-force Vulnerability Report

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Assignee
Assign to
Time tracking