Unrated severityNVD Advisory· Published May 18, 2007· Updated Apr 23, 2026
CVE-2007-2756
CVE-2007-2756
Description
The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
62- bugs.libgd.orgnvdPatch
- h20000.www2.hp.com/bizsupport/TechSupport/Document.jspnvd
- lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.htmlnvd
- osvdb.org/35788nvd
- osvdb.org/36643nvd
- rhn.redhat.com/errata/RHSA-2007-0889.htmlnvd
- secunia.com/advisories/25353nvd
- secunia.com/advisories/25362nvd
- secunia.com/advisories/25378nvd
- secunia.com/advisories/25535nvd
- secunia.com/advisories/25575nvd
- secunia.com/advisories/25590nvd
- secunia.com/advisories/25646nvd
- secunia.com/advisories/25657nvd
- secunia.com/advisories/25658nvd
- secunia.com/advisories/25787nvd
- secunia.com/advisories/25855nvd
- secunia.com/advisories/26048nvd
- secunia.com/advisories/26231nvd
- secunia.com/advisories/26390nvd
- secunia.com/advisories/26871nvd
- secunia.com/advisories/26895nvd
- secunia.com/advisories/26930nvd
- secunia.com/advisories/26967nvd
- secunia.com/advisories/27037nvd
- secunia.com/advisories/27102nvd
- secunia.com/advisories/27110nvd
- secunia.com/advisories/27545nvd
- secunia.com/advisories/29157nvd
- secunia.com/advisories/30168nvd
- security.gentoo.org/glsa/glsa-200708-05.xmlnvd
- security.gentoo.org/glsa/glsa-200711-34.xmlnvd
- security.gentoo.org/glsa/glsa-200805-13.xmlnvd
- slackware.com/security/viewer.phpnvd
- support.avaya.com/elmodocs2/security/ASA-2007-449.htmnvd
- www.gentoo.org/security/en/glsa/glsa-200710-02.xmlnvd
- www.libgd.org/ReleaseNote020035nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2007_13_sr.htmlnvd
- www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.htmlnvd
- www.php.net/releases/5_2_3.phpnvd
- www.redhat.com/support/errata/RHSA-2007-0890.htmlnvd
- www.redhat.com/support/errata/RHSA-2007-0891.htmlnvd
- www.redhat.com/support/errata/RHSA-2008-0146.htmlnvd
- www.securityfocus.com/bid/24089nvd
- www.securitytracker.com/idnvd
- www.trustix.org/errata/2007/0019/nvd
- www.trustix.org/errata/2007/0023/nvd
- www.ubuntu.com/usn/usn-473-1nvd
- www.vupen.com/english/advisories/2007/1904nvd
- www.vupen.com/english/advisories/2007/1905nvd
- www.vupen.com/english/advisories/2007/2016nvd
- www.vupen.com/english/advisories/2007/2336nvd
- www.vupen.com/english/advisories/2007/3386nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/34420nvd
- issues.rpath.com/browse/RPL-1394nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779nvd
- www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.htmlnvd
News mentions
0No linked articles in our index yet.