{"id":"CVE-2016-6128","details":"The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.","modified":"2026-02-24T01:09:39.843304Z","published":"2016-08-07T10:59:22.650Z","related":["MGASA-2016-0242","SUSE-SU-2016:2303-1","SUSE-SU-2016:2408-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","openSUSE-SU-2024:10062-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3619"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/06/30/1"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91509"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036276"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3030-1"},{"type":"ADVISORY","url":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61"},{"type":"ADVISORY","url":"https://github.com/libgd/libgd/commit/6ff72ae40c7c20ece939afb362d98cc37f4a1c96"},{"type":"ADVISORY","url":"https://libgd.github.io/release-2.2.3.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-09"},{"type":"REPORT","url":"https://bugs.php.net/72494"},{"type":"REPORT","url":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61"},{"type":"REPORT","url":"https://github.com/libgd/libgd/commit/6ff72ae40c7c20ece939afb362d98cc37f4a1c96"},{"type":"FIX","url":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/30/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"fixed":"1ccfe21e14c4d18336f9da8515cd17db88c3de61"},{"introduced":"0"},{"fixed":"6ff72ae40c7c20ece939afb362d98cc37f4a1c96"}]}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.0-rc2","gd-2.1.1","gd-2.2.0","gd-2.2.1"],"database_specific":{"vanir_signatures":[{"digest":{"length":1365,"function_hash":"234391009720094549110791023187180360736"},"target":{"function":"gdImageCropThreshold","file":"src/gd_crop.c"},"signature_type":"Function","source":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61","deprecated":false,"signature_version":"v1","id":"CVE-2016-6128-0ce6ddf1"},{"digest":{"line_hashes":["9126538461335498973293204557157608054","103533780240159628767177034044645754241","299426492980770477306086057184964756836"],"threshold":0.9},"target":{"file":"src/gd_crop.c"},"signature_type":"Line","source":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61","deprecated":false,"signature_version":"v1","id":"CVE-2016-6128-2db1fdc0"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6128.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}