{"id":"CVE-2016-10168","details":"Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.","modified":"2026-04-01T23:32:57.768937Z","published":"2017-03-15T15:59:00.343Z","related":["MGASA-2017-0055","MGASA-2017-0086","SUSE-SU-2017:0459-1","SUSE-SU-2017:0468-1","SUSE-SU-2017:0534-1","SUSE-SU-2017:0556-1","SUSE-SU-2017:0568-1","SUSE-SU-2017:2522-1","openSUSE-SU-2024:10777-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1037659"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95869"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"http://libgd.github.io/release-2.2.4.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3221"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3777"},{"type":"FIX","url":"https://github.com/libgd/libgd/issues/354"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/26/1"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/28/6"},{"type":"FIX","url":"https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"last_affected":"46ceef5970bf3a847ff61d1bdde7501d66c11d0c"},{"fixed":"69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.2.3"}]}}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.0-rc2","gd-2.1.1","gd-2.2.0","gd-2.2.1","gd-2.2.2","gd-2.2.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10168.json","vanir_signatures":[{"signature_type":"Line","source":"https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6","target":{"file":"src/gd_gd2.c"},"deprecated":false,"digest":{"threshold":0.9,"line_hashes":["106648440201846147386893940842185842636","118456646405056510212582140641998962289","226848554499470190433200253314073699263","295855378707841161551982573226769646937"]},"signature_version":"v1","id":"CVE-2016-10168-7a1c7174"},{"signature_type":"Function","source":"https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6","target":{"file":"src/gd_gd2.c","function":"_gd2GetHeader"},"deprecated":false,"digest":{"length":2693,"function_hash":"338426797981790896539239570930110931335"},"signature_version":"v1","id":"CVE-2016-10168-f7a2ee86"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}