CVE-2019-6977

gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
References
Link Resource
https://bugs.php.net/bug.php?id=77270 Issue Tracking Exploit Mailing List Vendor Advisory
http://php.net/ChangeLog-7.php Release Notes Vendor Advisory
http://php.net/ChangeLog-5.php Release Notes Vendor Advisory
http://www.securityfocus.com/bid/106731 Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html Mailing List Third Party Advisory
https://www.debian.org/security/2019/dsa-4384 Third Party Advisory
https://usn.ubuntu.com/3900-1/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20190315-0003/ Patch Third Party Advisory
https://security.gentoo.org/glsa/201903-18 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html
http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
https://www.exploit-db.com/exploits/46677/
https://access.redhat.com/errata/RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:3299
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:php:php:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

Configuration 5 (hide)

cpe:2.3:a:netapp:storage_automation_store:*:*:*:*:*:*:*:*

Information

Published : 2019-01-26 18:29

Updated : 2020-08-24 10:37


NVD link : CVE-2019-6977

Mitre link : CVE-2019-6977


JSON object : View

CWE
CWE-787

Out-of-bounds Write

Advertisement

dedicated server usa

Products Affected

libgd

  • libgd

canonical

  • ubuntu_linux

php

  • php

debian

  • debian_linux

netapp

  • storage_automation_store