Vulnerability Details : CVE-2016-6912
Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via large width and height values.
Vulnerability category: Memory Corruption
Products affected by CVE-2016-6912
- cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6912
0.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6912
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-6912
-
The product calls free() twice on the same memory address.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6912
-
http://www.debian.org/security/2017/dsa-3777
Debian -- Security Information -- DSA-3777-1 libgd2
-
https://github.com/libgd/libgd/blob/gd-2.2.4/CHANGELOG.md
libgd/CHANGELOG.md at gd-2.2.4 · libgd/libgd · GitHubRelease Notes;Patch
-
http://www.securityfocus.com/bid/95843
Libgd CVE-2016-6912 Security Bypass Vulnerability
-
https://github.com/libgd/libgd/commit/a49feeae76d41959d85ee733925a4cf40bac61b2
Fix double-free in gdImageWebPtr() · libgd/libgd@a49feea · GitHubPatch;Vendor Advisory
Jump to