{"id":"CVE-2016-8670","details":"Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.","modified":"2026-04-16T01:39:30.822489502Z","published":"2017-01-04T20:59:00.293Z","related":["SUSE-SU-2016:2668-1","SUSE-SU-2016:2670-1","SUSE-SU-2016:2681-1","SUSE-SU-2016:2683-1","SUSE-SU-2016:2683-2","SUSE-SU-2016:2766-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/93594"},{"type":"WEB","url":"https://support.f5.com/csp/article/K21336065?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3693"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/15/1"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://www.php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"https://bugs.php.net/bug.php?id=73280"},{"type":"ADVISORY","url":"https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"fixed":"53110871935244816bbb9d131da0bccff734bfe9"}]}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.0-rc2","gd-2.1.1","gd-2.2.0","gd-2.2.1"],"database_specific":{"vanir_signatures":[{"target":{"file":"src/gd_io_dp.c"},"id":"CVE-2016-8670-3d3e92c2","digest":{"threshold":0.9,"line_hashes":["280907635132757771241862687565417004148","208842456801732773520546011691672006005","224355342728290647457311352560791226710","70399781530177195079853539260536064350"]},"deprecated":false,"source":"https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9","signature_version":"v1","signature_type":"Line"},{"target":{"function":"dynamicGetbuf","file":"src/gd_io_dp.c"},"id":"CVE-2016-8670-5e33e159","digest":{"length":403,"function_hash":"172048093719602568786569527999506068490"},"source":"https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9","deprecated":false,"signature_version":"v1","signature_type":"Function"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8670.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}