In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'
References
Link | Resource |
---|---|
https://github.com/libgd/libgd/issues/383 | Exploit Issue Tracking Third Party Advisory |
https://github.com/libgd/libgd/issues/383 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/libgd/libgd/issues/383 - Exploit, Issue Tracking, Third Party Advisory |
07 Nov 2023, 02:49
Type | Values Removed | Values Added |
---|---|---|
Summary | In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.' |
Information
Published : 2020-02-27 05:15
Updated : 2024-11-21 03:29
NVD link : CVE-2017-6363
Mitre link : CVE-2017-6363
CVE.ORG link : CVE-2017-6363
JSON object : View
Products Affected
libgd
- libgd
CWE
CWE-125
Out-of-bounds Read