#VU33067 Stack-based buffer overflow in libgd - CVE-2016-5116
Published: August 7, 2016 / Updated: August 3, 2020
libgd
GD Software
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a long name. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html
- http://www.debian.org/security/2016/dsa-3619
- http://www.openwall.com/lists/oss-security/2016/05/29/5
- http://www.ubuntu.com/usn/USN-3030-1
- https://github.com/libgd/libgd/commit/4dc1a2d7931017d3625f2d7cff70a17ce58b53b4
- https://github.com/libgd/libgd/issues/211