CVE-2016-6207
moderate-risk
Published 2016-08-12
Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
Do I need to act?
~
8.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (4)
References (26)
Third Party Advisory
http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-...
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2750.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3630
Third Party Advisory
http://www.securityfocus.com/archive/1/539100/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/92080
Mailing List
http://www.ubuntu.com/usn/USN-3060-1
Issue Tracking
https://bugs.php.net/bug.php?id=72558
Vendor Advisory
https://libgd.github.io/release-2.2.3.html
Third Party Advisory
https://secunia.com/secunia_research/2016-9/
Third Party Advisory
https://security.gentoo.org/glsa/201612-09
Third Party Advisory
http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-...
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2750.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3630
Third Party Advisory
http://www.securityfocus.com/archive/1/539100/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/92080
and 6 more references
44
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
10/34 · Low
Exposure
10/34 · Low