CVE-2016-3074

CRITICAL

Libgd < 5.5.35 - Buffer Overflow

Title source: rule

Description

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

Exploits (1)

exploitdb WORKING POC
by Hans Jerry Illikainen · textremotelinux
https://www.exploit-db.com/exploits/39736

References (18)

Scores

CVSS v3 9.8
EPSS 0.5470
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-681
Status published
Products (11)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 15.10
canonical/ubuntu_linux 16.04
debian/debian_linux 7.0
debian/debian_linux 8.0
fedoraproject/fedora 23
fedoraproject/fedora 24
libgd/libgd 2.1.1
opensuse/opensuse 13.2
... and 1 more
Published Apr 26, 2016
Tracked Since Feb 18, 2026