CVE-2009-3546

NameCVE-2009-3546
DescriptionThe _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1936-1
Debian Bugs552534, 601525

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libgd2 (PTS)jessie, jessie (lts)2.1.0-5+deb8u15fixed
stretch (security)2.2.4-2+deb9u4fixed
stretch (lts), stretch2.2.4-2+deb9u6fixed
buster (security), buster, buster (lts)2.2.5-5.2+deb10u1fixed
bullseye2.3.0-2fixed
bookworm2.3.3-9fixed
sid, trixie2.3.3-12fixed
libwmf (PTS)jessie, jessie (lts)0.2.8.4-10.3+deb8u2vulnerable
stretch0.2.8.4-10.6vulnerable
buster0.2.8.4-14vulnerable
bullseye0.2.8.4-17vulnerable
bookworm0.2.12-5.1vulnerable
sid, trixie0.2.13-1.1vulnerable
php5 (PTS)jessie, jessie (lts)5.6.40+dfsg-0+deb8u21fixed
racket (PTS)jessie6.1-4fixed
stretch6.7-3fixed
buster7.2+dfsg1-2fixed
bullseye7.9+dfsg1-2fixed
bookworm8.7+dfsg1-1fixed
sid, trixie8.14+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libgd2sourceetch2.0.33-5.2etch2DSA-1936-1
libgd2sourcelenny2.0.36~rc1~dfsg-3+lenny1DSA-1936-1
libgd2source(unstable)2.0.36~rc1~dfsg-3.1medium552534
libwmfsource(unstable)(unfixed)unimportant
php5source(unstable)(not affected)
racketsource(unstable)5.0.2-1unimportant601525

Notes

Only present in one of the sample pl-scheme packages (plot)
- php5 <not-affected> (the php packages use the system libgd2)
http://svn.php.net/viewvc?view=revision&revision=289557
<20091015173822.084de220@redhat.com> in OSS-sec

Search for package or bug name: Reporting problems