CVE-2016-9933

Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html
http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2017/dsa-3751
http://www.openwall.com/lists/oss-security/2016/12/12/2 Third Party Advisory
http://www.php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.php.net/ChangeLog-7.php Release Notes Vendor Advisory
http://www.securityfocus.com/bid/94865
https://access.redhat.com/errata/RHSA-2018:1296
https://bugs.php.net/bug.php?id=72696 Vendor Advisory
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e Patch Vendor Advisory
https://github.com/libgd/libgd/issues/215 Vendor Advisory
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html
http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2017/dsa-3751
http://www.openwall.com/lists/oss-security/2016/12/12/2 Third Party Advisory
http://www.php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.php.net/ChangeLog-7.php Release Notes Vendor Advisory
http://www.securityfocus.com/bid/94865
https://access.redhat.com/errata/RHSA-2018:1296
https://bugs.php.net/bug.php?id=72696 Vendor Advisory
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e Patch Vendor Advisory
https://github.com/libgd/libgd/issues/215 Vendor Advisory
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:libgd:libgd:2.2.1:*:*:*:*:*:*:*
OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*

History

21 Nov 2024, 03:02

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html - () http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html -
References () http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html - () http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html -
References () http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html - () http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html -
References () http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html - () http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html -
References () http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html - () http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html -
References () http://www.debian.org/security/2017/dsa-3751 - () http://www.debian.org/security/2017/dsa-3751 -
References () http://www.openwall.com/lists/oss-security/2016/12/12/2 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/12/12/2 - Third Party Advisory
References () http://www.php.net/ChangeLog-5.php - Release Notes, Vendor Advisory () http://www.php.net/ChangeLog-5.php - Release Notes, Vendor Advisory
References () http://www.php.net/ChangeLog-7.php - Release Notes, Vendor Advisory () http://www.php.net/ChangeLog-7.php - Release Notes, Vendor Advisory
References () http://www.securityfocus.com/bid/94865 - () http://www.securityfocus.com/bid/94865 -
References () https://access.redhat.com/errata/RHSA-2018:1296 - () https://access.redhat.com/errata/RHSA-2018:1296 -
References () https://bugs.php.net/bug.php?id=72696 - Vendor Advisory () https://bugs.php.net/bug.php?id=72696 - Vendor Advisory
References () https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e - Patch, Vendor Advisory () https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e - Patch, Vendor Advisory
References () https://github.com/libgd/libgd/issues/215 - Vendor Advisory () https://github.com/libgd/libgd/issues/215 - Vendor Advisory
References () https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 - Vendor Advisory () https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 - Vendor Advisory

Information

Published : 2017-01-04 20:59

Updated : 2024-11-21 03:02


NVD link : CVE-2016-9933

Mitre link : CVE-2016-9933

CVE.ORG link : CVE-2016-9933


JSON object : View

Products Affected

libgd

  • libgd

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer