Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-11038

Опубликовано: 19 июн. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 5.3

Описание

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

РелизСтатусПримечание
bionic

released

2.2.5-4ubuntu0.4
cosmic

ignored

end of life
devel

not-affected

2.2.5-5.2
disco

ignored

end of life
eoan

not-affected

2.2.5-5.2
esm-infra-legacy/trusty

not-affected

2.1.0-3ubuntu0.11+esm1
esm-infra/bionic

not-affected

2.2.5-4ubuntu0.4
esm-infra/focal

not-affected

2.2.5-5.2
esm-infra/xenial

not-affected

2.1.1-4ubuntu0.16.04.12
focal

not-affected

2.2.5-5.2

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

not-affected

uses system gd
esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

uses system gd
focal

DNE

groovy

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system gd
cosmic

not-affected

uses system gd
devel

DNE

disco

not-affected

uses system gd
eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

uses system gd
esm-infra/focal

DNE

focal

DNE

groovy

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

not-affected

uses system gd
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

EPSS

Процентиль: 92%
0.09212
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 5.3
nvd
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 5.3
debian
около 6 лет назад

When using the gdImageCreateFromXbm() function in the GD Graphics Libr ...

CVSS3: 5.3
github
около 3 лет назад

When using gdImageCreateFromXbm() function of gd extension in versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость функции gdImageCreateFromXbm графической библиотеке GD интерпретатора языка программирования PHP, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации

EPSS

Процентиль: 92%
0.09212
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Уязвимость CVE-2019-11038