{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-05-16T00:00:00.000Z","descriptions":[{"lang":"en","value":"The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"26231","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26231"},{"name":"36643","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/36643"},{"name":"1018187","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1018187"},{"name":"29157","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29157"},{"name":"25658","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25658"},{"name":"27110","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27110"},{"name":"25590","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25590"},{"name":"26048","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26048"},{"name":"gd-gdpngreaddata-dos(34420)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"name":"25362","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25362"},{"name":"OpenPKG-SA-2007.020","tags":["vendor-advisory","x_refsource_OPENPKG"],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"name":"25657","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25657"},{"name":"FEDORA-2007-709","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"name":"25855","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25855"},{"name":"26967","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26967"},{"name":"MDKSA-2007:122","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"name":"ADV-2007-2016","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"name":"GLSA-200805-13","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"name":"GLSA-200710-02","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"name":"MDKSA-2007:123","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"name":"24089","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/24089"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.libgd.org/ReleaseNote020035"},{"name":"GLSA-200708-05","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"name":"30168","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30168"},{"name":"MDKSA-2007:124","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"name":"ADV-2007-1904","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/1904"},{"name":"26930","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26930"},{"name":"35788","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/35788"},{"name":"FEDORA-2007-2215","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"name":"ADV-2007-2336","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"name":"RHSA-2007:0889","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"name":"2007-0023","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2007/0023/"},{"name":"25353","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25353"},{"name":"ADV-2007-3386","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"tags":["x_refsource_CONFIRM"],"url":"http://bugs.libgd.org/?do=details&task_id=86"},{"name":"2007-0019","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2007/0019/"},{"name":"27037","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27037"},{"name":"SUSE-SR:2007:013","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"name":"25378","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25378"},{"name":"27545","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27545"},{"name":"GLSA-200711-34","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"name":"SSA:2007-152-01","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"name":"25646","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25646"},{"name":"RHSA-2008:0146","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.php.net/releases/5_2_3.php"},{"name":"SSRT071447","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1394"},{"name":"HPSBUX02262","tags":["vendor-advisory","x_refsource_HP"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"name":"25535","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25535"},{"name":"MDKSA-2007:187","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"name":"27102","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27102"},{"name":"oval:org.mitre.oval:def:10779","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"name":"26895","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26895"},{"name":"25787","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25787"},{"name":"25575","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25575"},{"name":"RHSA-2007:0890","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"name":"ADV-2007-1905","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/1905"},{"name":"26390","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26390"},{"name":"RHSA-2007:0891","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"name":"USN-473-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"name":"26871","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26871"},{"name":"SUSE-SA:2007:044","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-2756","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"26231","refsource":"SECUNIA","url":"http://secunia.com/advisories/26231"},{"name":"36643","refsource":"OSVDB","url":"http://osvdb.org/36643"},{"name":"1018187","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1018187"},{"name":"29157","refsource":"SECUNIA","url":"http://secunia.com/advisories/29157"},{"name":"25658","refsource":"SECUNIA","url":"http://secunia.com/advisories/25658"},{"name":"27110","refsource":"SECUNIA","url":"http://secunia.com/advisories/27110"},{"name":"25590","refsource":"SECUNIA","url":"http://secunia.com/advisories/25590"},{"name":"26048","refsource":"SECUNIA","url":"http://secunia.com/advisories/26048"},{"name":"gd-gdpngreaddata-dos(34420)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"name":"25362","refsource":"SECUNIA","url":"http://secunia.com/advisories/25362"},{"name":"OpenPKG-SA-2007.020","refsource":"OPENPKG","url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"name":"25657","refsource":"SECUNIA","url":"http://secunia.com/advisories/25657"},{"name":"FEDORA-2007-709","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"name":"25855","refsource":"SECUNIA","url":"http://secunia.com/advisories/25855"},{"name":"26967","refsource":"SECUNIA","url":"http://secunia.com/advisories/26967"},{"name":"MDKSA-2007:122","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"name":"ADV-2007-2016","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2016"},{"name":"GLSA-200805-13","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"name":"GLSA-200710-02","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"name":"MDKSA-2007:123","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"name":"24089","refsource":"BID","url":"http://www.securityfocus.com/bid/24089"},{"name":"http://www.libgd.org/ReleaseNote020035","refsource":"CONFIRM","url":"http://www.libgd.org/ReleaseNote020035"},{"name":"GLSA-200708-05","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"name":"30168","refsource":"SECUNIA","url":"http://secunia.com/advisories/30168"},{"name":"MDKSA-2007:124","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"name":"ADV-2007-1904","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/1904"},{"name":"26930","refsource":"SECUNIA","url":"http://secunia.com/advisories/26930"},{"name":"35788","refsource":"OSVDB","url":"http://osvdb.org/35788"},{"name":"FEDORA-2007-2215","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"name":"ADV-2007-2336","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/2336"},{"name":"RHSA-2007:0889","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"name":"2007-0023","refsource":"TRUSTIX","url":"http://www.trustix.org/errata/2007/0023/"},{"name":"25353","refsource":"SECUNIA","url":"http://secunia.com/advisories/25353"},{"name":"ADV-2007-3386","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3386"},{"name":"http://bugs.libgd.org/?do=details&task_id=86","refsource":"CONFIRM","url":"http://bugs.libgd.org/?do=details&task_id=86"},{"name":"2007-0019","refsource":"TRUSTIX","url":"http://www.trustix.org/errata/2007/0019/"},{"name":"27037","refsource":"SECUNIA","url":"http://secunia.com/advisories/27037"},{"name":"SUSE-SR:2007:013","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"name":"25378","refsource":"SECUNIA","url":"http://secunia.com/advisories/25378"},{"name":"27545","refsource":"SECUNIA","url":"http://secunia.com/advisories/27545"},{"name":"GLSA-200711-34","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"name":"SSA:2007-152-01","refsource":"SLACKWARE","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"name":"25646","refsource":"SECUNIA","url":"http://secunia.com/advisories/25646"},{"name":"RHSA-2008:0146","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"name":"http://www.php.net/releases/5_2_3.php","refsource":"CONFIRM","url":"http://www.php.net/releases/5_2_3.php"},{"name":"SSRT071447","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"name":"https://issues.rpath.com/browse/RPL-1394","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1394"},{"name":"HPSBUX02262","refsource":"HP","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"name":"25535","refsource":"SECUNIA","url":"http://secunia.com/advisories/25535"},{"name":"MDKSA-2007:187","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"name":"27102","refsource":"SECUNIA","url":"http://secunia.com/advisories/27102"},{"name":"oval:org.mitre.oval:def:10779","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"name":"26895","refsource":"SECUNIA","url":"http://secunia.com/advisories/26895"},{"name":"25787","refsource":"SECUNIA","url":"http://secunia.com/advisories/25787"},{"name":"25575","refsource":"SECUNIA","url":"http://secunia.com/advisories/25575"},{"name":"RHSA-2007:0890","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"name":"ADV-2007-1905","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/1905"},{"name":"26390","refsource":"SECUNIA","url":"http://secunia.com/advisories/26390"},{"name":"RHSA-2007:0891","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"name":"USN-473-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-473-1"},{"name":"26871","refsource":"SECUNIA","url":"http://secunia.com/advisories/26871"},{"name":"SUSE-SA:2007:044","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T13:49:57.293Z"},"title":"CVE Program Container","references":[{"name":"26231","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26231"},{"name":"36643","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/36643"},{"name":"1018187","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1018187"},{"name":"29157","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29157"},{"name":"25658","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25658"},{"name":"27110","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27110"},{"name":"25590","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25590"},{"name":"26048","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26048"},{"name":"gd-gdpngreaddata-dos(34420)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"},{"name":"25362","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25362"},{"name":"OpenPKG-SA-2007.020","tags":["vendor-advisory","x_refsource_OPENPKG","x_transferred"],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"},{"name":"25657","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25657"},{"name":"FEDORA-2007-709","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"},{"name":"25855","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25855"},{"name":"26967","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26967"},{"name":"MDKSA-2007:122","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"},{"name":"ADV-2007-2016","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2016"},{"name":"GLSA-200805-13","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200805-13.xml"},{"name":"GLSA-200710-02","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"},{"name":"MDKSA-2007:123","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"},{"name":"24089","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/24089"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.libgd.org/ReleaseNote020035"},{"name":"GLSA-200708-05","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200708-05.xml"},{"name":"30168","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30168"},{"name":"MDKSA-2007:124","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"},{"name":"ADV-2007-1904","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/1904"},{"name":"26930","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26930"},{"name":"35788","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/35788"},{"name":"FEDORA-2007-2215","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"},{"name":"ADV-2007-2336","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/2336"},{"name":"RHSA-2007:0889","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2007-0889.html"},{"name":"2007-0023","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2007/0023/"},{"name":"25353","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25353"},{"name":"ADV-2007-3386","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://bugs.libgd.org/?do=details&task_id=86"},{"name":"2007-0019","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2007/0019/"},{"name":"27037","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27037"},{"name":"SUSE-SR:2007:013","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"name":"25378","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25378"},{"name":"27545","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27545"},{"name":"GLSA-200711-34","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200711-34.xml"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"},{"name":"SSA:2007-152-01","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"},{"name":"25646","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25646"},{"name":"RHSA-2008:0146","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2008-0146.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.php.net/releases/5_2_3.php"},{"name":"SSRT071447","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1394"},{"name":"HPSBUX02262","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"name":"25535","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25535"},{"name":"MDKSA-2007:187","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"},{"name":"27102","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27102"},{"name":"oval:org.mitre.oval:def:10779","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"},{"name":"26895","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26895"},{"name":"25787","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25787"},{"name":"25575","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25575"},{"name":"RHSA-2007:0890","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0890.html"},{"name":"ADV-2007-1905","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/1905"},{"name":"26390","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26390"},{"name":"RHSA-2007:0891","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0891.html"},{"name":"USN-473-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-473-1"},{"name":"26871","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26871"},{"name":"SUSE-SA:2007:044","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-2756","datePublished":"2007-05-18T18:00:00.000Z","dateReserved":"2007-05-18T00:00:00.000Z","dateUpdated":"2024-08-07T13:49:57.293Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}