CVE-2016-6906

Published on: 03/15/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:10 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Certain versions of Libgd from Libgd contain the following vulnerability:

The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.

  • CVE-2016-6906 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3777-1 libgd2 www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3777
libgd CVE-2016-6906 Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 96503
libgd/CHANGELOG.md at gd-2.2.4 · libgd/libgd · GitHub Release Notes
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/libgd/libgd/blob/gd-2.2.4/CHANGELOG.md
Fix OOB reads of the TGA decompression buffer · libgd/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/libgd/libgd/commit/fb0e0cce0b9f25389ab56604c3547351617e1415
Fix OOB reads of the TGA decompression buffer · libgd/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLibgdLibgdAllAllAllAll
  • cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*: