// For flags

CVE-2009-3546

gd: insufficient input validation in _gdGetColors()

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.

La función _gdGetColors en el archivo gd_gd.c en PHP versión 5.2.11 y versiones 5.3.x anteriores a 5.3.1, y GD Graphics Library versiones 2.x, no comprueba apropiadamente un determinado miembro de la estructura colorTotal, lo que podría permitir a los atacantes remotos conducir ataques de desbordamiento de búfer o de lectura excesiva de búfer por medio de un archivo GD especialmente diseñado, una vulnerabilidad diferente de CVE-2009-3293. NOTA: algunos de estos datos fueron obtenidos de la información de terceros.

Tomas Hoger discovered that the GD library did not properly handle the number of colors in certain malformed GD images. If a user or automated system were tricked into processing a specially crafted GD image, an attacker could cause a denial of service or possibly execute arbitrary code. It was discovered that the GD library did not properly handle incorrect color indexes. An attacker could send specially crafted input to applications linked against libgd2 and cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 6.06 LTS. It was discovered that the GD library did not properly handle certain malformed GIF images. If a user or automated system were tricked into processing a specially crafted GIF image, an attacker could cause a denial of service. This issue only affected Ubuntu 6.06 LTS. It was discovered that the GD library did not properly handle large angle degree values. An attacker could send specially crafted input to applications linked against libgd2 and cause a denial of service. This issue only affected Ubuntu 6.06 LTS.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-10-05 CVE Reserved
  • 2009-10-19 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-05-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.33
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.33"
-
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.34
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.34"
-
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.34
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.34"
rc1
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.34
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.34"
rc2
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.35
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.35"
-
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.35
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.35"
rc1
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.35
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.35"
rc2
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.35
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.35"
rc3
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.35
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.35"
rc4
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.35
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.35"
rc5
Affected
Libgd
Search vendor "Libgd"
Gd Graphics Library
Search vendor "Libgd" for product "Gd Graphics Library"
2.0.36
Search vendor "Libgd" for product "Gd Graphics Library" and version "2.0.36"
rc1
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.2.11
Search vendor "Php" for product "Php" and version "5.2.11"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
5.3.0
Search vendor "Php" for product "Php" and version "5.3.0"
-
Affected