Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11038

Опубликовано: 19 июн. 2019
Источник: debian
EPSS Низкий

Описание

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgd2fixed2.2.5-5.2package
libgd2fixed2.2.4-2+deb9u5stretchpackage
php7.3fixed7.3.6-1package
php7.0removedpackage
php5removedpackage

Примечания

  • Fixed in 7.1.30, 7.2.19, 7.3.6

  • PHP Bug: https://bugs.php.net/bug.php?id=77973

  • https://github.com/libgd/libgd/issues/501

  • https://github.com/libgd/libgd/commit/e13a342c079aeb73e31dfa19eaca119761bac3f3

EPSS

Процентиль: 90%
0.06012
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 3.3
redhat
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 5.3
nvd
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 5.3
github
около 3 лет назад

When using gdImageCreateFromXbm() function of gd extension in versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации

EPSS

Процентиль: 90%
0.06012
Низкий