Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14553

Опубликовано: 11 фев. 2020
Источник: debian
EPSS Низкий

Описание

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgd2fixed2.3.0-1package
libgd2no-dsastretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1599032

  • https://github.com/libgd/libgd/commit/a93eac0e843148dc2d631c3ba80af17e9c8c860f

  • https://github.com/libgd/libgd/pull/580

EPSS

Процентиль: 70%
0.00646
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

CVSS3: 7.4
redhat
больше 5 лет назад

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

CVSS3: 7.5
nvd
больше 5 лет назад

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

CVSS3: 7.5
github
около 3 лет назад

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing atteckers to crash an application via a specific function call sequence.

CVSS3: 7.5
fstec
почти 7 лет назад

Уязвимость функции gdImageClone компонента gd.c графической библиотеки LibGD, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 70%
0.00646
Низкий