Описание
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/xenial | not-affected | |
precise | not-affected | 2.0.36~rc1~dfsg-6ubuntu2.1 |
trusty | not-affected | |
trusty/esm | not-affected | |
upstream | released | 2.0.34 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | uses system gd |
precise | not-affected | uses system gd |
trusty | not-affected | uses system gd |
trusty/esm | not-affected | uses system gd |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | not-affected | uses system gd |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | uses system gd |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | uses system gd |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | DNE |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
Integer overflow in the gdImageCreate function in gd.c in the GD Graph ...
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
ELSA-2016-2598: php security and bug fix update (MODERATE)
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3