CVE-2004-0941
Summary
| CVE | CVE-2004-0941 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-02-09 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990. |
Risk And Classification
Primary CVSS: v2.0 10 from [email protected]
AV:N/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Gd Graphics Library | Gdlib | 1.8.4 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.1 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.20 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.21 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.22 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.23 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.26 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.27 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.28 | All | All | All |
| Application | Gd Graphics Library | Gdlib | 2.0.33 | All | All | All |
| Operating System | Trustix | Secure Linux | 1.5 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.1 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.2 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| P-071: Updated "gd" Packages | af854a3a-2127-422b-91ae-364da2661108 | www.ciac.org | |
| Secunia - Advisories - GD Graphics Library Unspecified Buffer Overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Advisories - Mandriva Linux | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Debian -- Security Information -- DSA-601-1 libgd | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| usn/usn-25-1 - Ubuntu Linux | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| GD Graphics Library Multiple Unspecified Remote Buffer overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| Secunia - Advisories - Mandriva update for libwmf | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| usn/usn-33-1 - Ubuntu Linux | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Mandriva update for php - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Advisories - Mandriva Linux | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Advisories - Mandriva Linux OS | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Red Hat update for gd - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| www.trustix.org/errata/2004/0058 | af854a3a-2127-422b-91ae-364da2661108 | www.trustix.org | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.