Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
References
| Link | Resource |
|---|---|
| https://secunia.com/secunia_research/2016-9/ | Third Party Advisory VDB Entry |
| https://libgd.github.io/release-2.2.3.html | Vendor Advisory |
| http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html | Third Party Advisory |
| http://www.securitytracker.com/id/1036535 | Patch Third Party Advisory VDB Entry |
| http://www.debian.org/security/2016/dsa-3630 | Third Party Advisory |
| https://bugs.php.net/bug.php?id=72558 | Issue Tracking |
| http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html | Third Party Advisory |
| http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html | |
| http://www.ubuntu.com/usn/USN-3060-1 | |
| http://www.securityfocus.com/bid/92080 | |
| https://security.gentoo.org/glsa/201612-09 | |
| http://rhn.redhat.com/errata/RHSA-2016-2750.html | |
| http://www.securityfocus.com/archive/1/539100/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-08-12 15:59
Updated : 2018-10-30 16:27
NVD link : CVE-2016-6207
Mitre link : CVE-2016-6207
JSON object : View
Products Affected
opensuse
- leap
debian
- debian_linux
libgd
- libgd
