Description
Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages1 packages
🔴Vulnerability Details
4GHSAGHSA-7hrm-234x-37p5: Integer signedness error in the dynamicGetbuf function in gd_io_dp↗2022-05-17 ▶ OSVCVE-2016-8670: Integer signedness error in the dynamicGetbuf function in gd_io_dp↗2017-01-04 ▶ CVEListCVE-2016-8670: Integer signedness error in the dynamicGetbuf function in gd_io_dp↗2017-01-04 ▶ OSVlibgd2 vulnerabilities↗2016-11-01 ▶ 📋Vendor Advisories
4AppleCVE-2016-8670: macOS Sierra 10.12.3↗2017-01-23 ▶ UbuntuGD library vulnerabilities↗2016-11-01 ▶ Red Hatphp: Stack based buffer overflow in dynamicGetbuf↗2016-10-10 ▶ DebianCVE-2016-8670: libgd2 - Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD G...↗2016 ▶ 💬Community
4BugzillaCVE-2016-8670 php: gd, php: Stack based buffer overflow in dynamicGetbuf [fedora-all]↗2016-11-04 ▶ BugzillaCVE-2016-8670 gd: Stack based buffer overflow in dynamicGetbuf [fedora-all]↗2016-11-02 ▶ BugzillaCVE-2016-8670 php: Stack based buffer overflow in dynamicGetbuf↗2016-11-02 ▶ BugzillaCVE-2016-8670 gd, php: Stack based buffer overflow in dynamicGetbuf [fedora-all]↗2016-11-02 ▶