Unrated severityNVD Advisory· Published Jan 30, 2007· Updated Apr 23, 2026
CVE-2007-0455
CVE-2007-0455
Description
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
Affected products
13- cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*Range: <=2.0.33
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
35- bugzilla.redhat.com/bugzilla/show_bug.cginvdIssue TrackingThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2007-0155.htmlnvdThird Party Advisory
- secunia.com/advisories/23916nvdNot ApplicableVendor Advisory
- www.redhat.com/support/errata/RHSA-2007-0153.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2007-0162.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2008-0146.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/466166/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/22289nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-473-1nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303nvdThird Party Advisory
- fedoranews.org/cms/node/2631nvdBroken Link
- lists.rpath.com/pipermail/security-announce/2007-February/000145.htmlnvdBroken Link
- secunia.com/advisories/24022nvdNot Applicable
- secunia.com/advisories/24052nvdNot Applicable
- secunia.com/advisories/24053nvdNot Applicable
- secunia.com/advisories/24107nvdNot Applicable
- secunia.com/advisories/24143nvdNot Applicable
- secunia.com/advisories/24151nvdNot Applicable
- secunia.com/advisories/24924nvdNot Applicable
- secunia.com/advisories/24945nvdNot Applicable
- secunia.com/advisories/24965nvdNot Applicable
- secunia.com/advisories/25575nvdNot Applicable
- secunia.com/advisories/29157nvdNot Applicable
- secunia.com/advisories/42813nvdNot Applicable
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.trustix.org/errata/2007/0007nvdBroken Link
- www.vupen.com/english/advisories/2007/0400nvdPermissions Required
- www.vupen.com/english/advisories/2011/0022nvdPermissions Required
- issues.rpath.com/browse/RPL-1030nvdBroken Link
- issues.rpath.com/browse/RPL-1268nvdBroken Link
News mentions
0No linked articles in our index yet.