CVE-2016-3074
CRITICALLibgd < 5.5.35 - Buffer Overflow
Title source: ruleDescription
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
Exploits (1)
exploitdb
WORKING POC
by Hans Jerry Illikainen · textremotelinux
https://www.exploit-db.com/exploits/39736
References (18)
Scores
CVSS v3
9.8
EPSS
0.5470
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-681
Status
draft
Affected Products (11)
libgd/libgd
debian/debian_linux
debian/debian_linux
fedoraproject/fedora
fedoraproject/fedora
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
opensuse/opensuse
php/php
< 5.5.35
Timeline
Published
Apr 26, 2016
Tracked Since
Feb 18, 2026