5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
82.2%
Debian Security Advisory DSA-3961-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
September 03, 2017 https://www.debian.org/security/faq
Package : libgd2
CVE ID : CVE-2017-6362
A double-free vulnerability was discovered in the gdImagePngPtr()
function in libgd2, a library for programmatic graphics creation and
manipulation, which may result in denial of service or potentially the
execution of arbitrary code if a specially crafted file is processed.
For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.0-5+deb8u11.
For the stable distribution (stretch), this problem has been fixed in
version 2.2.4-2+deb9u2.
For the unstable distribution (sid), this problem has been fixed in
version 2.2.5-1.
We recommend that you upgrade your libgd2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | mips | libgd3 | < 2.2.4-2+deb9u2 | libgd3_2.2.4-2+deb9u2_mips.deb |
Debian | 9 | mips64el | libgd-tools | < 2.2.4-2+deb9u2 | libgd-tools_2.2.4-2+deb9u2_mips64el.deb |
Debian | 9 | mips64el | libgd-dev | < 2.2.4-2+deb9u2 | libgd-dev_2.2.4-2+deb9u2_mips64el.deb |
Debian | 9 | armhf | libgd-tools-dbgsym | < 2.2.4-2+deb9u2 | libgd-tools-dbgsym_2.2.4-2+deb9u2_armhf.deb |
Debian | 8 | s390x | libgd3 | < 2.1.0-5+deb8u11 | libgd3_2.1.0-5+deb8u11_s390x.deb |
Debian | 7 | armel | libgd2-xpm-dev | < 2.0.36~rc1~dfsg-6.1+deb7u10 | libgd2-xpm-dev_2.0.36~rc1~dfsg-6.1+deb7u10_armel.deb |
Debian | 8 | armhf | libgd-dbg | < 2.1.0-5+deb8u11 | libgd-dbg_2.1.0-5+deb8u11_armhf.deb |
Debian | 9 | armel | libgd-tools | < 2.2.4-2+deb9u2 | libgd-tools_2.2.4-2+deb9u2_armel.deb |
Debian | 8 | amd64 | libgd2-xpm-dev | < 2.1.0-5+deb8u11 | libgd2-xpm-dev_2.1.0-5+deb8u11_amd64.deb |
Debian | 8 | armel | libgd-dev | < 2.1.0-5+deb8u11 | libgd-dev_2.1.0-5+deb8u11_armel.deb |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
82.2%