CVE-2016-9933

HIGH

Libgd - Memory Corruption

Title source: rule
STIX 2.1

Description

Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.

References (15)

Core 15
Core References
Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/12/12/2
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
Release Notes, Vendor Advisory x_refsource_confirm
http://www.php.net/ChangeLog-7.php
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3751
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/94865
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:1296
Release Notes, Vendor Advisory x_refsource_confirm
http://www.php.net/ChangeLog-5.php
Vendor Advisory x_refsource_confirm
https://bugs.php.net/bug.php?id=72696
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
Vendor Advisory x_refsource_confirm
https://github.com/libgd/libgd/issues/215

Scores

CVSS v3 7.5
EPSS 0.1110
EPSS Percentile 93.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-119
Status published
Products (1)
libgd/libgd 2.2.1
Published Jan 04, 2017
Tracked Since Feb 18, 2026