CVE-2016-6207

Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2750.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3630 Third Party Advisory
http://www.securityfocus.com/archive/1/539100/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/92080 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036535 Patch Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3060-1 Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=72558 Issue Tracking Vendor Advisory
https://libgd.github.io/release-2.2.3.html Vendor Advisory
https://secunia.com/secunia_research/2016-9/ Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201612-09 Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2750.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3630 Third Party Advisory
http://www.securityfocus.com/archive/1/539100/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/92080 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036535 Patch Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3060-1 Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=72558 Issue Tracking Vendor Advisory
https://libgd.github.io/release-2.2.3.html Vendor Advisory
https://secunia.com/secunia_research/2016-9/ Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201612-09 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:55

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html - Third Party Advisory, VDB Entry
References () http://rhn.redhat.com/errata/RHSA-2016-2750.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2750.html - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3630 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3630 - Third Party Advisory
References () http://www.securityfocus.com/archive/1/539100/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/539100/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/92080 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92080 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036535 - Patch, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036535 - Patch, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-3060-1 - Mailing List, Third Party Advisory () http://www.ubuntu.com/usn/USN-3060-1 - Mailing List, Third Party Advisory
References () https://bugs.php.net/bug.php?id=72558 - Issue Tracking, Vendor Advisory () https://bugs.php.net/bug.php?id=72558 - Issue Tracking, Vendor Advisory
References () https://libgd.github.io/release-2.2.3.html - Vendor Advisory () https://libgd.github.io/release-2.2.3.html - Vendor Advisory
References () https://secunia.com/secunia_research/2016-9/ - Third Party Advisory, VDB Entry () https://secunia.com/secunia_research/2016-9/ - Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201612-09 - Third Party Advisory () https://security.gentoo.org/glsa/201612-09 - Third Party Advisory

Information

Published : 2016-08-12 15:59

Updated : 2024-11-21 02:55


NVD link : CVE-2016-6207

Mitre link : CVE-2016-6207

CVE.ORG link : CVE-2016-6207


JSON object : View

Products Affected

libgd

  • libgd

debian

  • debian_linux

php

  • php

opensuse

  • leap
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-190

Integer Overflow or Wraparound

CWE-787

Out-of-bounds Write