SB2019032818 - Gentoo update for GD
Published: March 28, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Double free error (CVE-ID: CVE-2018-1000222)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to double free memory error. A remote unauthenticated attacker can trick the victim into jpeg image, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Infinite loop (CVE-ID: CVE-2018-5711)
The disclosed vulnerability allows a local unauthenticated attacker to cause DoS condition.
The vulnerability exists in PHP GD Graphics Library due to insufficient sanitization of user-supplied data. A local attacker can submit a specially crafted GIF, trigger an infinite loop and cause the service to crash.
3) Out-of-bounds write (CVE-ID: CVE-2019-6977)
The vulnerability allows a remote attacker to execute arbitrary on the target system.The weakness exists due to out-of-bounds write in imagecolormatch. A remote attacker can write up to 1200 bytes over the boundaries of a buffer allocated in the imagecolormatch function, which then calls gdImageColorMatch() and execute arbitrary code with elevated privileges.
4) Double Free (CVE-ID: CVE-2019-6978)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. A remote attacker can trick the victim into opening a specially crafted input, trigger double free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.