CVE-2016-3074
CRITICALLibgd < 5.5.35 - Buffer Overflow
Title source: ruleDescription
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
Exploits (1)
exploitdb
WORKING POC
by Hans Jerry Illikainen · textremotelinux
https://www.exploit-db.com/exploits/39736
References (18)
Scores
CVSS v3
9.8
EPSS
0.5470
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-681
Status
published
Products (11)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
15.10
canonical/ubuntu_linux
16.04
debian/debian_linux
7.0
debian/debian_linux
8.0
fedoraproject/fedora
23
fedoraproject/fedora
24
libgd/libgd
2.1.1
opensuse/opensuse
13.2
... and 1 more
Published
Apr 26, 2016
Tracked Since
Feb 18, 2026