First published: Fri Aug 12 2016(Updated: )
Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.0.9 | 7.0.9 |
libgd | <=2.2.2 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =42.1 | |
PHP | >=5.5.0<5.5.38 | |
PHP | >=5.6.0<5.6.24 | |
PHP | >=7.0.0<7.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6207 is classified as a medium severity vulnerability due to the potential for denial of service.
To fix CVE-2016-6207, upgrade GD Graphics Library to version 2.2.3 or later.
CVE-2016-6207 affects PHP versions prior to 7.0.9, including the ranges 5.5.0 to 5.5.38 and 5.6.0 to 5.6.24.
CVE-2016-6207 can lead to denial of service due to out-of-bounds memory writes or memory consumption.
CVE-2016-6207 affects versions of libgd up to 2.2.2, as well as certain PHP versions and Debian and openSUSE distributions.