9 results (0.016 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks. GD Graphics Library (también se conoce como LibGD) versiones hasta 2.3.2, presenta una lectura fuera de límites debido a una falta de ciertas comprobaciones de los valores de retorno de gdGetBuf y gdPutBuf • https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9 https://github.com/libgd/libgd/issues/750#issuecomment-914872385 https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes. ** EN DISPUTA ** la función gdImageGd2Ptr en el archivo gd_gd2.c en GD Graphics Library (también se conoce como LibGD) hasta la versión 2.3.2, presenta una doble liberación. NOTA: la posición del proveedor es "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes." • https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af https://github.com/libgd/libgd/issues/700 https://github.com/libgd/libgd/pull/713 • CWE-415: Double Free •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. Una función read_header_tga en el archivo gd_tga.c en GD Graphics Library (también se conoce como LibGD) versiones hasta 2.3.2 permite a atacantes remotos causar una denegación de servicio (lectura fuera de los límites) por medio de un archivo TGA diseñado • https://github.com/libgd/libgd/issues/697 https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032 https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html • CWE-125: Out-of-bounds Read •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.' ** EN DISPUTA ** En la GD Graphics Library (también se conoce como Libgd) versiones hasta 2.2.5, se presenta una lectura excesiva del búfer en la región heap de la memoria en tiffWriter en el archivo gd_tiff.c. NOTA: el proveedor dice "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'" • https://github.com/libgd/libgd/issues/383 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled). La función gdImageClone en el archivo gd.c en libgd versiones 2.1.0-rc2 hasta 2.2.5, presenta una desreferencia del puntero NULL que permite a atacantes bloquear una aplicación por medio de una secuencia de llamada de función específica. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html https://bugzilla.redhat.com/show_bug.cgi?id=1599032 https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f https://github.com/libgd/libgd/pull/580 https://lists.debian.org/debian-lts-announce/2020/02/msg00014.html https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6 https:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-476: NULL Pointer Dereference •