4.3
CVSSv2

CVE-2016-6207

Published: 12/08/2016 Updated: 29/08/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) prior to 2.2.3 allows remote malicious users to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libgd libgd

debian debian linux 8.0

opensuse leap 42.1

php php

Vendor Advisories

Synopsis Moderate: rh-php56 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php56, rh-php56-php, and rh-php56-php-pear is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Mo ...
The GD library could be made to crash or run programs if it processed a specially crafted image file ...
Secunia Research at Flexera Software discovered an integer overflow vulnerability within the _gdContributionsAlloc() function in libgd2, a library for programmatic graphics creation and manipulation A remote attacker can take advantage of this flaw to cause a denial-of-service against an application using the libgd2 library For the stable distrib ...
Integer overflow in the _gdContributionsAlloc function in gd_interpolationc in GD Graphics Library (aka libgd) before 223 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors ...