Description
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
References (9)
Core 9
Core References
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/91743
Various Sources x_refsource_confirm
http://libgd.github.io/release-2.2.3.html
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-08/msg00121.html
Issue Tracking, Patch x_refsource_confirm
https://github.com/libgd/libgd/issues/248
Issue Tracking, Patch x_refsource_confirm
https://github.com/libgd/libgd/pull/251
Issue Tracking, Patch x_refsource_confirm
https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186
Issue Tracking, Patch x_refsource_confirm
https://github.com/libgd/libgd/commit/01c61f8ab110a77ae64b5ca67c244c728c506f03
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/08/23/1
Scores
CVSS v3
6.5
EPSS
0.0141
EPSS Percentile
80.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (3)
libgd/libgd
< 2.2.2
opensuse/leap
42.1
opensuse/opensuse
13.2
Published
Oct 03, 2016
Tracked Since
Feb 18, 2026