First published: Mon Aug 20 2018(Updated: )
Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libgd Libgd | =2.2.5 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
ubuntu/libgd2 | <2.2.5-4ubuntu0.2 | 2.2.5-4ubuntu0.2 |
ubuntu/libgd2 | <2.1.0-3ubuntu0.10 | 2.1.0-3ubuntu0.10 |
ubuntu/libgd2 | <2.1.1-4ubuntu0.16.04.10 | 2.1.1-4ubuntu0.16.04.10 |
debian/libgd2 | 2.3.0-2 2.3.3-9 2.3.3-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000222 is a vulnerability in Libgd version 2.2.5 that allows for remote code execution through a double free vulnerability in the gdImageBmpPtr function.
CVE-2018-1000222 has a severity rating of 8.8, which is considered high.
To fix CVE-2018-1000222, you should update to a version of Libgd that has fixed the vulnerability. For example, updating to version 2.1.0-3ubuntu0.10 on Ubuntu Trusty.
You can find more information about CVE-2018-1000222 on the MITRE CVE database (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222) and the Libgd GitHub repository (https://github.com/libgd/libgd/issues/447, https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5).
The CWE of CVE-2018-1000222 is CWE-415, which is a type of double free vulnerability.