Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3074

Опубликовано: 26 апр. 2016
Источник: debian

Описание

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgd2fixed2.1.1-4.1package
php5fixed5.6.21+dfsg-1package
php7.0fixed7.0.6-1package
hhvmfixed3.12.11+dfsg-1package

Примечания

  • HHVM implements additional sanity checks, not directly epxloitable

  • PoC: https://github.com/dyntopia/exploits/tree/master/CVE-2016-3074

  • Upstream fix: https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19

  • Starting with 5.4.0-1 Debian uses the system copy of libgd

  • PHP bug: https://bugs.php.net/bug.php?id=71912

  • HHVM fix: https://github.com/facebook/hhvm/commit/29a6487d648d1593e1e2fa615d9b3a844756ddc3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

redhat
около 9 лет назад

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

CVSS3: 9.8
nvd
около 9 лет назад

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

CVSS3: 9.8
github
около 3 лет назад

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.