Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2016-8670

Published: 14 October 2016

Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.

Notes

AuthorNote
mdeslaur
php uses the system libgd2
0019-Patch-for-security-bug-https-bugs.php.net-bug.php-id.patch
in Debian jessie update.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libgd2
Launchpad, Ubuntu, Debian
upstream Needs triage

precise
Released (2.0.36~rc1~dfsg-6ubuntu2.3)
trusty
Released (2.1.0-3ubuntu0.5)
xenial
Released (2.1.1-4ubuntu0.16.04.5)
yakkety
Released (2.2.1-1ubuntu3.2)
Patches:
upstream: https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9
php5
Launchpad, Ubuntu, Debian
upstream Needs triage

precise Not vulnerable
(uses system gd)
trusty Not vulnerable
(uses system gd)
xenial Does not exist

yakkety Does not exist

php7.0
Launchpad, Ubuntu, Debian
upstream Needs triage

precise Does not exist

trusty Does not exist

xenial Not vulnerable
(uses system gd)
yakkety Not vulnerable
(uses system gd)