{"id":"CVE-2016-6214","details":"gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.","modified":"2026-04-16T01:41:41.379443915Z","published":"2016-08-12T15:59:04.980Z","related":["SUSE-SU-2016:2303-1","openSUSE-SU-2024:10062-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3619"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/07/13/12"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/07/13/5"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3060-1"},{"type":"ADVISORY","url":"https://github.com/libgd/libgd/issues/247#issuecomment-232084241"},{"type":"ADVISORY","url":"https://libgd.github.io/release-2.2.3.html"},{"type":"REPORT","url":"https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7"},{"type":"FIX","url":"https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/07/13/12"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/07/13/5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"fixed":"10ef1dca63d62433fda13309b4a228782db823f7"}]}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.0-rc2","gd-2.1.1","gd-2.2.0","gd-2.2.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6214.json","vanir_signatures":[{"signature_type":"Function","digest":{"function_hash":"55900490187423335330061296559373662146","length":1332},"signature_version":"v1","deprecated":false,"source":"https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7","target":{"function":"gdImageCreateFromTgaCtx","file":"src/gd_tga.c"},"id":"CVE-2016-6214-1277a250"},{"signature_type":"Function","digest":{"function_hash":"37064346827640731547326727603637989507","length":1493},"signature_version":"v1","source":"https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7","deprecated":false,"target":{"function":"read_header_tga","file":"src/gd_tga.c"},"id":"CVE-2016-6214-4f495b72"},{"deprecated":false,"digest":{"threshold":0.9,"line_hashes":["260666195903274125141485926370821504385","313574199412802646470636348552250275738","128373506977164072793474050797181921731","286162231239254963014910501664243199713","274997624418073002567592884343268777666","335424365619064663184464761993890110401","74461475998663967309038838447206131192","318633837655575569043704940444817072410","89214482570473447586551989623381005071","235881890338064293325088245582286174889","117614744725804787332167252931684301078","88810359274775174604650321526908194619","96730783909642883164274645651287601940","325558587484593738894404098801093233528","74256367332740332339142324129698002304","308875761997315018365033601396781395649","197387456224307533672784995922925912039"]},"signature_version":"v1","signature_type":"Line","source":"https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7","target":{"file":"src/gd_tga.c"},"id":"CVE-2016-6214-887f3a9b"}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}