CVE-2016-3074

CRITICAL

Libgd < 5.5.35 - Buffer Overflow

Title source: rule

Description

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

Exploits (1)

exploitdb WORKING POC
by Hans Jerry Illikainen · textremotelinux
https://www.exploit-db.com/exploits/39736

References (18)

Scores

CVSS v3 9.8
EPSS 0.5470
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-681
Status draft

Affected Products (11)

libgd/libgd
debian/debian_linux
debian/debian_linux
fedoraproject/fedora
fedoraproject/fedora
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
opensuse/opensuse
php/php < 5.5.35

Timeline

Published Apr 26, 2016
Tracked Since Feb 18, 2026