GD Library gdImageCropThreshold() Out-of-Bounds Memory Read Error Lets Remote Users Cause the Target Application to Crash
|
SecurityTracker Alert ID: 1036276 |
SecurityTracker URL: http://securitytracker.com/id/1036276
|
CVE Reference:
CVE-2016-6128
(Links to External Site)
|
Date: Jul 12 2016
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in GD Library. A remote user can cause the target application to crash.
A remote user can create a specially crafted image file that, when processed by the target application using the GD Library (libgd), will trigger an out-of-bounds memory read error in gdImageCropThreshold() and cause the target application using libgd to crash.
|
Impact:
A remote user can cause the target application using libgd to crash.
|
Solution:
The vendor has issued a source code fix, available at:
https://github.com/libgd/libgd/compare/3fe0a7128bac5000fdcfab888bd2a75ec0c9447d...fd623025505e87bba7ec8555eeb72dae4fb0afd
|
Vendor URL: libgd.github.io/ (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|