Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
php | eq | 5.5.0 alpha1 | |
php | eq | 5.5.0 alpha3 | |
php | eq | 5.5.0 beta3 | |
php | eq | 5.5.1 | |
php | eq | 5.5.5 | |
php | eq | 5.5.7 | |
php | eq | 5.5.0 beta1 | |
php | eq | 5.5.6 | |
php | eq | 5.5.0 rc1 | |
php | eq | 5.5.0 beta4 |
git.php.net/?p=php-src.git%3Ba=commit%3Bh=8f4a5373bb71590352fd934028d6dde5bc18530b
secunia.com/advisories/56829
www.mandriva.com/security/advisories?name=MDVSA-2014:027
www.php.net/ChangeLog-5.php
www.securityfocus.com/bid/65533
www.securitytracker.com/id/1029767
www.ubuntu.com/usn/USN-2126-1
bugs.php.net/bug.php?id=66356
bugzilla.redhat.com/show_bug.cgi?id=1065108
exchange.xforce.ibmcloud.com/vulnerabilities/91099
github.com/php/php-src/commit/2938329ce19cb8c4197dec146c3ec887c6f61d01