CVE-2013-7328
Published Feb 18, 2014
Last updated a year ago
Overview
- Description
- Multiple integer signedness errors in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allow remote attackers to cause a denial of service (application crash) or obtain sensitive information via an imagecrop function call with a negative value for the (1) x or (2) y dimension, a different vulnerability than CVE-2013-7226.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F6D9B19-E64D-4BED-9194-17460CE19E6F" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D25E591-448C-4E3B-8557-6E48F7571796" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DA18F3F-B4B5-40C3-BF19-67C1F0C1787D" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF783C9-26E7-4E02-BD41-77B9783667E3" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF49701D-ECE4-4CEB-BDAB-24C09C8AD4B4" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AEDF6F7-001D-4A35-A26F-417991AD377F" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4031DB99-B4B4-41EC-B3C1-543D92C575A9" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5450EA7-A398-49D2-AA8E-7C95B074BAB1" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04FE0E4E-BC94-4DC9-BE9B-DC57B952B2FB" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB8E09D8-9CBE-4279-88B7-24A214A5A537" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D41ECCE-887D-49A2-9BB3-B559495AC55B" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79B418BC-27F4-4443-A0F7-FF4ADA568C1B" }, { "criteria": "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EEBDF62-BA1B-4438-9AEA-8B56AA5713E8" }, { "criteria": "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F644EA6C-50C6-4A1C-A4AC-287AA9477B46" }, { "criteria": "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DD47F30-74F5-48E8-8657-C2373FE2BD22" }, { "criteria": "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C09527B-6B47-41F8-BDE6-01C47E452286" }, { "criteria": "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E454D87-23CB-4D7F-90FE-942EE54D661F" }, { "criteria": "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1031E646-F2CF-4A3E-8E6A-5D4BC950BEDA" }, { "criteria": "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "130E50C1-D209-4CFF-9399-69D561340FBB" }, { "criteria": "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1F29948-9417-460B-8B04-D91AE4E8B423" }, { "criteria": "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A37D00C1-4F41-4400-9CE4-8E8BAA3E4142" } ], "operator": "OR" } ] } ]