CVE-2016-10167
gd: DoS vulnerability in gdImageCreateFromGd2Ctx()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
La función gdImageCreateFromGd2Ctx en gd_gd2.c en la GD Graphics Library (también conocida como libgd) en versiones anteriores a 2.2.4 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un archivo de imagen manipulado.
A null pointer dereference flaw was found in libgd. An attacker could use a specially-crafted .gd2 file to cause an application linked with libgd to crash, leading to denial of service.
Stefan Esser discovered that the GD library incorrectly handled memory when processing certain images. If a user or automated system were tricked into processing a specially crafted image, an attacker could cause a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. It was discovered that the GD library incorrectly handled certain malformed images. If a user or automated system were tricked into processing a specially crafted image, an attacker could cause a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-01-28 CVE Reserved
- 2017-02-13 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95869 | Third Party Advisory | |
http://www.securitytracker.com/id/1037659 | Vdb Entry | |
https://www.tenable.com/security/tns-2017-04 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2017/01/26/1 | 2018-05-04 | |
http://www.openwall.com/lists/oss-security/2017/01/28/6 | 2018-05-04 | |
https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f | 2018-05-04 |
URL | Date | SRC |
---|---|---|
http://libgd.github.io/release-2.2.4.html | 2018-05-04 | |
http://www.debian.org/security/2017/dsa-3777 | 2018-05-04 | |
https://access.redhat.com/errata/RHSA-2017:3221 | 2018-05-04 | |
https://access.redhat.com/errata/RHSA-2018:1296 | 2018-05-04 | |
https://access.redhat.com/security/cve/CVE-2016-10167 | 2018-05-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1418984 | 2018-05-03 |