9.8

CVE-2016-3074

Exploit

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LibgdLibgd Version2.1.1
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
FedoraprojectFedora Version23
FedoraprojectFedora Version24
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionesm
OpensuseOpensuse Version13.2
PhpPhp Version >= 5.5.0 < 5.5.35
PhpPhp Version >= 5.6.0 < 5.6.21
PhpPhp Version >= 7.0.0 < 7.0.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 52.52% 0.979
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-681 Incorrect Conversion between Numeric Types

When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.

http://seclists.org/fulldisclosure/2016/Apr/72
Third Party Advisory
Exploit
Mailing List
http://www.securityfocus.com/bid/87087
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1035659
Third Party Advisory
Broken Link
VDB Entry
https://www.exploit-db.com/exploits/39736/
Third Party Advisory
Exploit
VDB Entry