Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
PHP '_gdGetColors()' Buffer Overflow Vulnerability
Information
Severity
Severity
Critical
Family
Family
Buffer overflow
CVSSv2 Base
CVSSv2 Base
9.3
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
14 years ago
Modified
Modified
5 years ago
Summary
The host is running PHP and is prone to Buffer Overflow vulnerability.
Insight
Insight
The flaw is due to error in '_gdGetColors' function in gd_gd.c which fails to check certain colorsTotal structure member, whicn can be exploited to cause buffer overflow or buffer over-read attacks via a crafted GD file.
Affected Software
Affected Software
PHP version 5.2.x to 5.2.11 and 5.3.0 on Linux.
Solution
Solution
Update to version 5.2.12, 5.3.1 or later.