CVE-2016-9933

Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html
http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2017/dsa-3751
http://www.openwall.com/lists/oss-security/2016/12/12/2 Third Party Advisory
http://www.php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.php.net/ChangeLog-7.php Release Notes Vendor Advisory
http://www.securityfocus.com/bid/94865
https://access.redhat.com/errata/RHSA-2018:1296
https://bugs.php.net/bug.php?id=72696 Vendor Advisory
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e Patch Vendor Advisory
https://github.com/libgd/libgd/issues/215 Vendor Advisory
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html
http://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html
http://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html
http://www.debian.org/security/2017/dsa-3751
http://www.openwall.com/lists/oss-security/2016/12/12/2 Third Party Advisory
http://www.php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.php.net/ChangeLog-7.php Release Notes Vendor Advisory
http://www.securityfocus.com/bid/94865
https://access.redhat.com/errata/RHSA-2018:1296
https://bugs.php.net/bug.php?id=72696 Vendor Advisory
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e Patch Vendor Advisory
https://github.com/libgd/libgd/issues/215 Vendor Advisory
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:libgd:libgd:2.2.1:*:*:*:*:*:*:*
OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-01-04 20:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-9933

Mitre link : CVE-2016-9933

CVE.ORG link : CVE-2016-9933


JSON object : View

Products Affected

libgd

  • libgd

php

  • php
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer