CVE-2016-10168
gd: Integer overflow in gd_io.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
Desbordamiento de entero en gd_io.c en la GD Graphics Library (también conocida como libgd) en versiones anteriores a 2.2.4 permite a atacantes remotos tener un impacto no especificado a través de vectores que implican el número de trozos horizontales y verticales en una imagen.
An integer overflow flaw, leading to a heap-based buffer overflow was found in the way libgd read some specially-crafted gd2 files. A remote attacker could use this flaw to crash an application compiled with libgd or in certain cases execute arbitrary code with the privileges of the user running that application.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-01-28 CVE Reserved
- 2017-02-13 CVE Published
- 2024-08-06 CVE Updated
- 2024-10-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95869 | Third Party Advisory | |
http://www.securitytracker.com/id/1037659 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2017/01/26/1 | 2018-05-04 | |
http://www.openwall.com/lists/oss-security/2017/01/28/6 | 2018-05-04 | |
https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6 | 2018-05-04 | |
https://github.com/libgd/libgd/issues/354 | 2018-05-04 |
URL | Date | SRC |
---|---|---|
http://libgd.github.io/release-2.2.4.html | 2018-05-04 | |
http://www.debian.org/security/2017/dsa-3777 | 2018-05-04 | |
https://access.redhat.com/errata/RHSA-2017:3221 | 2018-05-04 | |
https://access.redhat.com/errata/RHSA-2018:1296 | 2018-05-04 | |
https://access.redhat.com/security/cve/CVE-2016-10168 | 2018-05-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1418986 | 2018-05-03 |