First published: Sun Aug 07 2016(Updated: )
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.0.8 | 7.0.8 |
libgd | <=2.0.33 | |
PHP | <=5.5.36 | |
PHP | =5.6.0-alpha1 | |
PHP | =5.6.0-alpha2 | |
PHP | =5.6.0-alpha3 | |
PHP | =5.6.0-alpha4 | |
PHP | =5.6.0-alpha5 | |
PHP | =5.6.0-beta1 | |
PHP | =5.6.0-beta2 | |
PHP | =5.6.0-beta3 | |
PHP | =5.6.0-beta4 | |
PHP | =5.6.1 | |
PHP | =5.6.2 | |
PHP | =5.6.3 | |
PHP | =5.6.4 | |
PHP | =5.6.5 | |
PHP | =5.6.6 | |
PHP | =5.6.7 | |
PHP | =5.6.8 | |
PHP | =5.6.9 | |
PHP | =5.6.10 | |
PHP | =5.6.11 | |
PHP | =5.6.12 | |
PHP | =5.6.13 | |
PHP | =5.6.14 | |
PHP | =5.6.15 | |
PHP | =5.6.16 | |
PHP | =5.6.17 | |
PHP | =5.6.18 | |
PHP | =5.6.19 | |
PHP | =5.6.20 | |
PHP | =5.6.21 | |
PHP | =5.6.22 | |
PHP | =7.0.0 | |
PHP | =7.0.1 | |
PHP | =7.0.2 | |
PHP | =7.0.3 | |
PHP | =7.0.4 | |
PHP | =7.0.5 | |
PHP | =7.0.6 | |
PHP | =7.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5767 has a high severity, as it can lead to denial of service through a heap-based buffer overflow.
To fix CVE-2016-5767, upgrade to PHP versions 7.0.8 or newer, or GD Graphics Library version 2.0.34RC1 or newer.
PHP versions below 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 are affected by CVE-2016-5767.
There are no known effective workarounds for CVE-2016-5767; upgrading to patched versions is recommended.
CVE-2016-5767 is classified as a remote denial of service vulnerability due to integer overflow.