First published: Tue Apr 26 2016(Updated: )
Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.0.6 | 7.0.6 |
libgd | =2.1.1 | |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =23 | |
Fedora | =24 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
SUSE Linux | =13.2 | |
PHP | >=5.5.0<5.5.35 | |
PHP | >=5.6.0<5.6.21 | |
PHP | >=7.0.0<7.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3074 has been classified with a high severity level due to the potential for remote code execution and denial of service.
To fix CVE-2016-3074, update the GD Graphics Library to version 2.1.1 or later, and ensure your PHP version is updated to at least 7.0.6.
CVE-2016-3074 affects GD Graphics Library version 2.1.1, as well as various PHP versions prior to 7.0.6, and multiple Linux distributions including Debian, Fedora, and Ubuntu.
Yes, CVE-2016-3074 can lead to remote exploitation through crafted compressed gd2 data, which may result in a heap-based buffer overflow.
Yes, a patch is available that addresses the vulnerability specifically in GD Graphics Library and its dependent software.