- Description
- Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:N/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55"
},
{
"criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A"
},
{
"criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790"
},
{
"criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0"
}
],
"operator": "OR"
}
]
}
]