Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
References
Configurations
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html - Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2750.html - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3630 - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/539100/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/92080 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1036535 - Patch, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-3060-1 - Mailing List, Third Party Advisory | |
References | () https://bugs.php.net/bug.php?id=72558 - Issue Tracking, Vendor Advisory | |
References | () https://libgd.github.io/release-2.2.3.html - Vendor Advisory | |
References | () https://secunia.com/secunia_research/2016-9/ - Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201612-09 - Third Party Advisory |
Information
Published : 2016-08-12 15:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6207
Mitre link : CVE-2016-6207
CVE.ORG link : CVE-2016-6207
JSON object : View
Products Affected
libgd
- libgd
debian
- debian_linux
php
- php
opensuse
- leap