CVE-2007-1001

N/A Unknown
Published: April 06, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2007-0155.html
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24814
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24909
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24924
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24945
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24965
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25056
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25151
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25445
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26235
Source: secalert@redhat.com
Vendor Advisory
http://us2.php.net/releases/4_4_7.php
Source: secalert@redhat.com
http://us2.php.net/releases/5_2_2.php
Source: secalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2007-0153.html
Source: secalert@redhat.com
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0162.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/23357
Source: secalert@redhat.com
http://www.securityfocus.com/bid/25159
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2007/1269
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2007/2732
Source: secalert@redhat.com
Vendor Advisory
https://issues.rpath.com/browse/RPL-1268
Source: secalert@redhat.com
http://docs.info.apple.com/article.html?artnum=306172
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2007-0155.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24814
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24909
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24924
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24945
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24965
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25056
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25151
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25445
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26235
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200705-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://us2.php.net/releases/4_4_7.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://us2.php.net/releases/5_2_2.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:087
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:088
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:089
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:090
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2007_32_php.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0153.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0162.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/464957/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/466166/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/23357
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25159
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1269
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/2732
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/33453
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1268
Source: af854a3a-2127-422b-91ae-364da2661108

70 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
11.6%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

php