libgd 'read_image_tga' Function Heap Buffer Overflow Vulnerability

libgd is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.

Attackers can exploit this issue to cause to obtain sensitive information. Due to the nature of this issue, code execution may be possible but this has not been confirmed.


 

Privacy Statement
Copyright 2010, SecurityFocus