Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
Numeric Errors
Integer Overflow or Wraparound
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/libwmf | deb | debian | 12 | >=0.2.12-5.1 | Not yet available |
debian/libgd2 | deb | debian | 11 | <2.0.35.dfsg-1 | 2.0.35.dfsg-1 |
debian/libgd2 | deb | debian | 12 | <2.0.35.dfsg-1 | 2.0.35.dfsg-1 |
debian/libgd2 | deb | debian | unstable | <2.0.35.dfsg-1 | 2.0.35.dfsg-1 |
debian/libgd2 | deb | debian | 10 | <2.0.35.dfsg-1 | 2.0.35.dfsg-1 |
debian/libgd2 | deb | debian | 13 | <2.0.35.dfsg-1 | 2.0.35.dfsg-1 |
debian/libwmf | deb | debian | unstable | >=0.2.13-1.1 | Not yet available |
debian/libwmf | deb | debian | 10 | >=0.2.8.4-14 | Not yet available |
debian/libwmf | deb | debian | 11 | >=0.2.8.4-17 | Not yet available |
debian/libwmf | deb | debian | 13 | >=0.2.13-1.1 | Not yet available |
debian/racket | deb | debian | unstable | <5.0.2-1 | 5.0.2-1 |
debian/racket | deb | debian | 12 | <5.0.2-1 | 5.0.2-1 |
debian/racket | deb | debian | 10 | <5.0.2-1 | 5.0.2-1 |
debian/racket | deb | debian | 11 | <5.0.2-1 | 5.0.2-1 |
debian/racket | deb | debian | 13 | <5.0.2-1 | 5.0.2-1 |
Severity and metrics
No CVSS data available from this source.
8.6
-
-
-