Описание
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
Отчет
In order to successfully exploit this vulnerability, the following prerequisites must be fulfilled:
- An attacker needs to supply a maliciously crafted XBM image designed to exploit the uninitialized variable in the gdImageCreateFromXbm() function.
- The application or service must accept and process XBM images using the vulnerable gdImageCreateFromXbm() function.
- User interaction is required to process the malicious XBM file. It's important to note that successful exploitation requires that the application processes untrusted XBM image data using the vulnerable function. As this is not common practice, RH ProdSec has set the Impact of this vulnerability to "Low"
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | gd | Out of support scope | ||
Red Hat Enterprise Linux 5 | php | Out of support scope | ||
Red Hat Enterprise Linux 5 | php53 | Out of support scope | ||
Red Hat Enterprise Linux 6 | gd | Out of support scope | ||
Red Hat Enterprise Linux 6 | php | Out of support scope | ||
Red Hat Enterprise Linux 7 | gd | Fix deferred | ||
Red Hat Enterprise Linux 7 | php | Fix deferred | ||
Red Hat Enterprise Linux 8 | gd | Fix deferred | ||
Red Hat Enterprise Linux 8 | php:7.2/php | Not affected | ||
Red Hat Software Collections | rh-php70-php | Fix deferred |
Показывать по
Дополнительная информация
Статус:
EPSS
3.3 Low
CVSS3
Связанные уязвимости
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
When using the gdImageCreateFromXbm() function in the GD Graphics Libr ...
When using gdImageCreateFromXbm() function of gd extension in versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации
EPSS
3.3 Low
CVSS3