CVE-2016-6207

Published on: 08/12/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.

  • CVE-2016-6207 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
PHP :: Sec Bug #72558 :: Integer overflow error within _gdContributionsAlloc() Issue Tracking
bugs.php.net
text/html
URL Logo CONFIRM bugs.php.net/bug.php?id=72558
GD: Multiple vulnerabilities (GLSA 201612-09) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201612-09
USN-3060-1: GD library vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-3060-1
libGD Integer Overflow in _gdContributionsAlloc() Lets Remote Users Cause the Target Application to Crash - SecurityTracker Patch
Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036535
Debian -- Security Information -- DSA-3630-1 libgd2 Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3630
SecurityFocus www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160803 Secunia Research: LibGD "_gdContributionsAlloc()" Integer Overflow Denial of Service Vulnerability
LibGD 2.2.3 release Vendor Advisory
libgd.github.io
text/html
URL Logo CONFIRM libgd.github.io/release-2.2.3.html
openSUSE-SU-2016:2117-1: moderate: Security update for gd lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:2117
LibGD 2.2.2 Integer Overflow / Denial Of Service ≈ Packet Storm Third Party Advisory
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html
PHP '_gdContributionsAlloc()' Function Integer Overflow Vulnerability cve.report (archive)
text/html
URL Logo BID 92080
About Secunia Research | Flexera Third Party Advisory
VDB Entry
web.archive.org
text/html
URL Logo MISC secunia.com/secunia_research/2016-9/
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2750
openSUSE-SU-2016:2363-1: moderate: Security update for gd Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:2363

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationLibgdLibgdAllAllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*: