The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
References
Link | Resource |
---|---|
http://libgd.github.io/release-2.2.3.html | |
http://lists.opensuse.org/opensuse-updates/2016-08/msg00121.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/08/23/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/91743 | Third Party Advisory VDB Entry |
https://github.com/libgd/libgd/commit/01c61f8ab110a77ae64b5ca67c244c728c506f03 | Issue Tracking Patch |
https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186 | Issue Tracking Patch |
https://github.com/libgd/libgd/issues/248 | Issue Tracking Patch |
https://github.com/libgd/libgd/pull/251 | Issue Tracking Patch |
Configurations
History
No history.
Information
Published : 2016-10-03 21:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-6905
Mitre link : CVE-2016-6905
CVE.ORG link : CVE-2016-6905
JSON object : View
Products Affected
opensuse
- opensuse
- leap
libgd
- libgd
CWE
CWE-125
Out-of-bounds Read