CVE-2016-7126

Published on: 09/11/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Php from Php contain the following vulnerability:

The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.

  • CVE-2016-7126 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
PHP :: Sec Bug #72697 :: select_colors write out-of-bounds Exploit
Issue Tracking
bugs.php.net
text/html
URL Logo CONFIRM bugs.php.net/bug.php?id=72697
PHP 'ext/gd/gd.c' Heap Based Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92755
oss-security - Re: CVE assignment for PHP 5.6.25 and 7.0.10 - and libcurl Mailing List
openwall.com
text/html
URL Logo MLIST [oss-security] 20160902 Re: CVE assignment for PHP 5.6.25 and 7.0.10 - and libcurl
[R6] SecurityCenter 5.4.1 Fixes Multiple Vulnerabilities - Security Advisory | Tenable Network Security Third Party Advisory
www.tenable.com
text/html
URL Logo CONFIRM www.tenable.com/security/tns-2016-19
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2750
Fix bug#72697 - select_colors write out-of-bounds · php/[email protected] · GitHub Issue Tracking
Patch
github.com
text/html
URL Logo CONFIRM github.com/php/php-src/commit/b6f13a5ef9d6280cf984826a5de012a32c396cd4?w=1
PHP Multiple Flaws Let Remote and Local Users Obtain Potentially Sensitive Information, Deny Service, and Execute Arbitrary Code - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036680
PHP: PHP 7 ChangeLog Release Notes
www.php.net
text/html
URL Logo CONFIRM www.php.net/ChangeLog-7.php
PHP: PHP 5 ChangeLog Release Notes
www.php.net
text/html
URL Logo CONFIRM www.php.net/ChangeLog-5.php
Fix bug#72697 - select_colors write out-of-bounds · php/[email protected] · GitHub Patch
Vendor Advisory
github.com
text/html
URL Logo CONFIRM github.com/php/php-src/commit/28022c9b1fd937436ab67bb3d61f652c108baf96
PHP: Multiple vulnerabilities (GLSA 201611-22) — Gentoo security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201611-22

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationPhpPhp7.0.0AllAllAll
ApplicationPhpPhp7.0.1AllAllAll
ApplicationPhpPhp7.0.2AllAllAll
ApplicationPhpPhp7.0.3AllAllAll
ApplicationPhpPhp7.0.4AllAllAll
ApplicationPhpPhp7.0.5AllAllAll
ApplicationPhpPhp7.0.6AllAllAll
ApplicationPhpPhp7.0.7AllAllAll
ApplicationPhpPhp7.0.8AllAllAll
ApplicationPhpPhp7.0.9AllAllAll
ApplicationPhpPhp7.0.0AllAllAll
ApplicationPhpPhp7.0.1AllAllAll
ApplicationPhpPhp7.0.2AllAllAll
ApplicationPhpPhp7.0.3AllAllAll
ApplicationPhpPhp7.0.4AllAllAll
ApplicationPhpPhp7.0.5AllAllAll
ApplicationPhpPhp7.0.6AllAllAll
ApplicationPhpPhp7.0.7AllAllAll
ApplicationPhpPhp7.0.8AllAllAll
ApplicationPhpPhp7.0.9AllAllAll
ApplicationPhpPhpAllAllAllAll
  • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*:
  • cpe:2.3:a:php:php:*:*:*:*:*:*:*:*: