SB2016120406 - Gentoo update for GD
Published: December 4, 2016 Updated: December 4, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2016-5766)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8,. A remote attacker can use crafted chunk dimensions in an image. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Input validation error (CVE-ID: CVE-2016-6128)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
3) Out-of-bounds read (CVE-ID: CVE-2016-6132)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
4) Buffer overflow (CVE-ID: CVE-2016-6207)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
5) Heap-based buffer overflow (CVE-ID: CVE-2016-7568)
The vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.The weakness is due to integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd). By performing a specially crafted imagewebp and imagedestroy calls, attackers can trigger a heap-based buffer overflow that lets them induce denial of service or execute arbitrary code.
Successful exploitation of the vulnerability results in denial of service or arbitrary code execution on the vulnerable system.
Remediation
Install update from vendor's website.