CVE-2016-10168
gd: Integer overflow in gd_io.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
Desbordamiento de entero en gd_io.c en la GD Graphics Library (también conocida como libgd) en versiones anteriores a 2.2.4 permite a atacantes remotos tener un impacto no especificado a través de vectores que implican el número de trozos horizontales y verticales en una imagen.
An integer overflow flaw, leading to a heap-based buffer overflow was found in the way libgd read some specially-crafted gd2 files. A remote attacker could use this flaw to crash an application compiled with libgd or in certain cases execute arbitrary code with the privileges of the user running that application.
Stefan Esser discovered that the GD library incorrectly handled memory when processing certain images. If a user or automated system were tricked into processing a specially crafted image, an attacker could cause a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 16.10. It was discovered that the GD library incorrectly handled certain malformed images. If a user or automated system were tricked into processing a specially crafted image, an attacker could cause a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-01-28 CVE Reserved
- 2017-02-13 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95869 | Third Party Advisory | |
http://www.securitytracker.com/id/1037659 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2017/01/26/1 | 2018-05-04 | |
http://www.openwall.com/lists/oss-security/2017/01/28/6 | 2018-05-04 | |
https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6 | 2018-05-04 | |
https://github.com/libgd/libgd/issues/354 | 2018-05-04 |
URL | Date | SRC |
---|---|---|
http://libgd.github.io/release-2.2.4.html | 2018-05-04 | |
http://www.debian.org/security/2017/dsa-3777 | 2018-05-04 | |
https://access.redhat.com/errata/RHSA-2017:3221 | 2018-05-04 | |
https://access.redhat.com/errata/RHSA-2018:1296 | 2018-05-04 | |
https://access.redhat.com/security/cve/CVE-2016-10168 | 2018-05-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1418986 | 2018-05-03 |