Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
References
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://libgd.github.io/release-2.2.4.html - Vendor Advisory | |
References | () http://www.debian.org/security/2017/dsa-3777 - | |
References | () http://www.openwall.com/lists/oss-security/2017/01/26/1 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/01/28/6 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95869 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037659 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3221 - | |
References | () https://access.redhat.com/errata/RHSA-2018:1296 - | |
References | () https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/libgd/libgd/issues/354 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-03-15 15:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10168
Mitre link : CVE-2016-10168
CVE.ORG link : CVE-2016-10168
JSON object : View
Products Affected
libgd
- libgd
CWE
CWE-190
Integer Overflow or Wraparound