HTTP: GD Library libgd gd_gd2.c Heap Buffer Overflow

This signature detects attempts to exploit a known vulnerability against LibGD. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.

Affected Products

Fedoraproject fedora

References

CVE: CVE-2016-3074

Short Name
HTTP:LIBGD-HEAP-BO
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2016-3074 GD Heap Library Overflow gd_gd2.c libgd
Release Date
06/09/2016
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Fedoraproject

Opensuse

Libgd

Php

Debian

Canonical

CVSS Score

7.5

Found a potential security threat?