CVE-2018-14553
moderate-risk
Published 2020-02-11
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
Do I need to act?
-
0.98% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (10)
Affected Vendors
References (18)
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1599032
Third Party Advisory
https://github.com/libgd/libgd/pull/580
Third Party Advisory
https://usn.ubuntu.com/4316-1/
Third Party Advisory
https://usn.ubuntu.com/4316-2/
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1599032
Third Party Advisory
https://github.com/libgd/libgd/pull/580
Third Party Advisory
https://usn.ubuntu.com/4316-1/
Third Party Advisory
https://usn.ubuntu.com/4316-2/
45
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
16/34 · Moderate