CVE-2016-3074
26.04.2016, 14:59
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.Enginsight
Vendor | Product | Version |
---|---|---|
libgd | libgd | 2.1.1 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.10 |
canonical | ubuntu_linux | 16.04 |
opensuse | opensuse | 13.2 |
php | php | 5.5.0 ≤ 𝑥 < 5.5.35 |
php | php | 5.6.0 ≤ 𝑥 < 5.6.21 |
php | php | 7.0.0 ≤ 𝑥 < 7.0.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||
---|---|---|---|---|---|---|---|---|---|
libgd2 |
| ||||||||
php5 |
| ||||||||
php7.0 |
|