CVE-2018-1000222
moderate-risk
Published 2018-08-20
Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5.
Do I need to act?
-
0.90% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (5)
References (10)
Issue Tracking
https://github.com/libgd/libgd/issues/447
Third Party Advisory
https://security.gentoo.org/glsa/201903-18
Mitigation
https://usn.ubuntu.com/3755-1/
Issue Tracking
https://github.com/libgd/libgd/issues/447
Third Party Advisory
https://security.gentoo.org/glsa/201903-18
Mitigation
https://usn.ubuntu.com/3755-1/
45
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
12/34 · Low