First published: Thu Jan 19 2017(Updated: )
Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gd | <2.2.4 | 2.2.4 |
redhat/php | <5.6.30 | 5.6.30 |
redhat/php | <7.0.15 | 7.0.15 |
redhat/php | <7.1.1 | 7.1.1 |
PHP | <7.0.15 | 7.0.15 |
libgd | <=2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10168 has a medium severity rating due to the potential for integer overflow vulnerabilities.
To fix CVE-2016-10168, upgrade the GD Graphics Library to version 2.2.4 or higher.
CVE-2016-10168 affects versions of the GD Graphics Library prior to 2.2.4 and certain versions of PHP.
An attacker could exploit CVE-2016-10168 by crafting a malicious image that triggers integer overflow, leading to potential denial of service.
Although CVE-2016-10168 has been patched, systems running outdated versions may still be at risk if not updated.