Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-7226

Опубликовано: 18 фев. 2014
Источник: debian
EPSS Низкий

Описание

Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.5.9+dfsg-1package
php5not-affectedwheezypackage
php5not-affectedsqueezepackage

Примечания

  • https://bugs.php.net/bug.php?id=66356

  • http://www.php.net/manual/en/function.imagecrop.php

EPSS

Процентиль: 93%
0.09699
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.

redhat
больше 11 лет назад

Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.

nvd
больше 11 лет назад

Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.

github
больше 3 лет назад

Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.

EPSS

Процентиль: 93%
0.09699
Низкий