Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libgd-dev",
"binary_version": "2.1.0-3ubuntu0.5"
},
{
"binary_name": "libgd-tools",
"binary_version": "2.1.0-3ubuntu0.5"
},
{
"binary_name": "libgd2-noxpm-dev",
"binary_version": "2.1.0-3ubuntu0.5"
},
{
"binary_name": "libgd2-xpm-dev",
"binary_version": "2.1.0-3ubuntu0.5"
},
{
"binary_name": "libgd3",
"binary_version": "2.1.0-3ubuntu0.5"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libgd-dev",
"binary_version": "2.1.1-4ubuntu0.16.04.5"
},
{
"binary_name": "libgd-tools",
"binary_version": "2.1.1-4ubuntu0.16.04.5"
},
{
"binary_name": "libgd3",
"binary_version": "2.1.1-4ubuntu0.16.04.5"
}
]
}