CVE-2016-5767
Published: 7 August 2016
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
Notes
Author | Note |
---|---|
mdeslaur | php uses the system libgd2 |
Priority
Status
Package | Release | Status |
---|---|---|
libgd2 Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(2.0.36~rc1~dfsg-6ubuntu2.1)
|
trusty |
Not vulnerable
|
|
upstream |
Released
(2.0.34)
|
|
wily |
Not vulnerable
|
|
xenial |
Not vulnerable
|
|
Patches: upstream: https://github.com/libgd/libgd/commit/cfee163a5e848fc3e3fb1d05a30d7557cdd36457 |
||
php5 Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(uses system gd)
|
trusty |
Not vulnerable
(uses system gd)
|
|
upstream |
Needs triage
|
|
wily |
Not vulnerable
(uses system gd)
|
|
xenial |
Does not exist
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commitdiff;h=c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6 |
||
php7.0 Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
wily |
Does not exist
|
|
xenial |
Not vulnerable
(uses system gd)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commitdiff;h=c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |