Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6xv8-25r4-5mrf

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

Ссылки

EPSS

Процентиль: 87%
0.03309
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

redhat
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

nvd
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.

debian
почти 19 лет назад

Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in ...

oracle-oval
больше 17 лет назад

ELSA-2008-0146: Moderate: gd security update (MODERATE)

EPSS

Процентиль: 87%
0.03309
Низкий