7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
Low
0.487 Medium
EPSS
Percentile
97.5%
It was discovered that the GD library incorrectly handled certain color
tables in XPM images. If a user or automated system were tricked into
processing a specially crafted XPM image, an attacker could cause a denial
of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-2497)
It was discovered that the GD library incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into processing a
specially crafted GIF image, an attacker could cause a denial of service.
This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-9709)
It was discovered that the GD library incorrectly handled memory when using
gdImageFillToBorder(). A remote attacker could possibly use this issue to
cause a denial of service. (CVE-2015-8874)
It was discovered that the GD library incorrectly handled memory when using
gdImageScaleTwoPass(). A remote attacker could possibly use this issue to
cause a denial of service. This issue only applied to Ubuntu 14.04 LTS,
Ubuntu 15.10 and Ubuntu 16.04 LTS. (CVE-2015-8877)
Hans Jerry Illikainen discovered that the GD library incorrectly handled
certain malformed GD images. If a user or automated system were tricked
into processing a specially crafted GD image, an attacker could cause a
denial of service or possibly execute arbitrary code. (CVE-2016-3074)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | libgd3 | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libgd-dbg | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libgd-dev | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libgd-dev-dbgsym | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libgd-tools | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libgd-tools-dbgsym | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libgd3-dbgsym | <Β 2.1.1-4ubuntu0.16.04.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libgd3 | <Β 2.1.1-4ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libgd-dbg | <Β 2.1.1-4ubuntu0.15.10.1 | UNKNOWN |
Ubuntu | 15.10 | noarch | libgd-dev | <Β 2.1.1-4ubuntu0.15.10.1 | UNKNOWN |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
Low
0.487 Medium
EPSS
Percentile
97.5%