9.8
CVSSv3

CVE-2016-7568

Published: 28/09/2016 Updated: 07/03/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) up to and including 2.2.3, as used in PHP up to and including 7.0.11, allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libgd libgd

php php

debian debian linux 8.0

Vendor Advisories

The GD library could be made to crash or run programs if it processed a specially crafted image file ...
Debian Bug report logs - #840806 libgd2: CVE-2016-6911: invalid read in gdImageCreateFromTiffPtr() Package: src:libgd2; Maintainer for src:libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 15 Oct 2016 05:09:05 UTC Severity: grave Tags: patch, security, up ...
Debian Bug report logs - #839659 libgd2: CVE-2016-7568: Integer overflow in gdImageWebpCtx Package: src:libgd2; Maintainer for src:libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 3 Oct 2016 15:27:02 UTC Severity: grave Tags: fixed-upstream, patch, secu ...
Debian Bug report logs - #840805 libgd2: CVE-2016-8670: Stack Buffer Overflow in GD dynamicGetbuf Package: src:libgd2; Maintainer for src:libgd2 is GD Team <team+gd@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 15 Oct 2016 05:03:01 UTC Severity: grave Tags: security, upstream ...
An integer overflow flaw, leading to a heap-based buffer overflow, was found in gd A specially crafted image, when converted to webp, could cause the application to crash or potentially execute arbitrary code ...
An integer overflow flaw, leading to a heap-based buffer overflow, was found in gd A specially crafted image, when converted to webp, could cause the application to crash or potentially execute arbitrary code ...