CVE-2016-6128Improper Input Validation in Libgd

Severity
7.5HIGHNVD
OSV7.6
EPSS
12.1%
top 6.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 7
Latest updateMay 13

Description

The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/libgd2< libgd2 2.2.2-29-g3c2b605-1 (bookworm)
NVDlibgd/libgd2.2.2
NVDopensuse/leap42.1

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10, 16.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-x3xg-pxf8-v7j9: The gdImageCropThreshold function in gd_crop2022-05-13
OSV
CVE-2016-6128: The gdImageCropThreshold function in gd_crop2016-08-07
OSV
libgd2 vulnerabilities2016-07-11

📋Vendor Advisories

3
Ubuntu
GD library vulnerabilities2016-07-11
Red Hat
gd: Invalid color index not properly handled2016-06-27
Debian
CVE-2016-6128: libgd2 - The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka l...2016

💬Community

3
Bugzilla
CVE-2016-6128 php: gd: Invalid color index not properly handled [fedora-all]2016-08-25
Bugzilla
CVE-2016-6128 gd: Invalid color index not properly handled2016-06-30
Bugzilla
CVE-2016-6128 gd: Invalid color index not properly handled [fedora-all]2016-06-30