Description
gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
References (9)
Core 9
Core References
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html
Vendor Advisory x_refsource_confirm
https://libgd.github.io/release-2.2.3.html
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html
Third Party Advisory x_refsource_confirm
https://github.com/libgd/libgd/issues/247#issuecomment-232084241
Issue Tracking, Patch x_refsource_confirm
https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/07/13/12
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/07/13/5
Vendor Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-3060-1
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2016/dsa-3619
Scores
CVSS v3
6.5
EPSS
0.0736
EPSS Percentile
91.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (3)
debian/debian_linux
8.0
libgd/libgd
< 2.2.2
opensuse/leap
42.1
Published
Aug 12, 2016
Tracked Since
Feb 18, 2026