8.8
CVSSv3

CVE-2016-5766

Published: 07/08/2016 Updated: 22/04/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) prior to 2.2.3, as used in PHP prior to 5.5.37, 5.6.x prior to 5.6.23, and 7.x prior to 7.0.8, allows remote malicious users to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat openshift 2.0

freebsd freebsd 8.3

redhat enterprise linux 6.0

freebsd freebsd 8.0

redhat enterprise linux 5

libgd libgd 2.2.2

freebsd freebsd 10.0

fedoraproject fedora 23

debian debian linux 8.0

freebsd freebsd 10.1

fedoraproject fedora 24

freebsd freebsd 8.4

freebsd freebsd 9.2

freebsd freebsd 8.2

freebsd freebsd 8.1

freebsd freebsd 9.0

freebsd freebsd 10.2

fedoraproject fedora 22

freebsd freebsd 9.3

redhat enterprise linux 7.0

freebsd freebsd 10.3

freebsd freebsd 9.1

Vendor Advisories

The GD library could be made to crash or run programs if it processed a specially crafted image file ...
Synopsis Moderate: gd security update Type/Severity Security Advisory: Moderate Topic An update for gd is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives ...
Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
Synopsis Moderate: Red Hat Advanced Cluster Management 213 security and bug fix update Type/Severity Security Advisory: Moderate Topic Red Hat Advanced Cluster Management for Kubernetes 213 General Availabilityrelease images, which fix several bugs and security issues Red Hat Product Security has rated ...
Several vulnerabilities were discovered in libgd2, a library for programmatic graphics creation and manipulation A remote attacker can take advantage of these flaws to cause a denial-of-service against an application using the libgd2 library (application crash), or potentially to execute arbitrary code with the privileges of the user running the a ...
Debian Bug report logs - #829062 libgd2: CVE-2016-6128: Invalid color index is not properly handled leading to denial of service Package: src:libgd2; Maintainer for src:libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 30 Jun 2016 07:39:01 UTC Severity: i ...
Debian Bug report logs - #829694 libgd2: CVE-2016-6132: read out-of-bands was found in the parsing of TGA files Package: libgd2; Maintainer for libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Hugo Lefeuvre <hle@debianorg> Date: Tue, 5 Jul 2016 12:24:01 UTC Severity: important Tags: security, upstream ...
Debian Bug report logs - #829014 libgd2: CVE-2016-5766: Integer Overflow in _gd2GetHeader() resulting in heap overflow Package: src:libgd2; Maintainer for src:libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 29 Jun 2016 19:15:02 UTC Severity: important T ...
An integer overflow, leading to a heap-based buffer overflow was found in the imagecreatefromgd2() function of PHP's gd extension A remote attacker could use this flaw to crash a PHP application or execute arbitrary code with the privileges of the user running that PHP application, using gd via a specially crafted GD2 image (CVE-2016-5766) ...
A stack consumption vulnerability in GD in PHP allows remote attackers to cause a denial of service via a crafted imagefilltoborder call (CVE-2015-8874) An integer overflow, leading to a heap-based buffer overflow was found in the imagecreatefromgd2() function of PHP's gd extension A remote attacker could use this flaw to crash a PHP application ...
An integer overflow flaw, leading to a heap-based buffer overflow was found in the imagecreatefromgd2() function of PHP's gd extension A remote attacker could use this flaw to crash a PHP application or execute arbitrary code with the privileges of the user running that PHP application using gd via a specially crafted GD2 image ...