{"id":"CVE-2016-3074","details":"Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.","modified":"2026-04-16T06:25:50.334659789Z","published":"2016-04-26T14:59:01.207Z","references":[{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201607-04"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3556"},{"type":"ADVISORY","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.383127"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/87087"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183263.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-22"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183724.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3602"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/538160/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035659"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2987-1"},{"type":"FIX","url":"https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/136757/libgd-2.1.1-Signedness.html"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/39736/"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2016/Apr/72"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"last_affected":"2912c0a2e0a246318f41bf1997f34ce1dc3e5e42"},{"fixed":"2bb97f407c1145c850416a3bfbcc8cf124e68a19"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.1.1"}]}},{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"introduced":"2c2d0de09e522fe097bfcebfb758171eb6aa5270"},{"fixed":"9d10b0109258e8ea797c8977c5932d162d6c6004"},{"introduced":"fc1df8e7a6886e29a6ed5bef3f674ac61164e847"},{"fixed":"50a8b9527a2317ba861ad0b660ff981f69941cfd"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"734a5fca2c4731e34eca551f28be9a10ffc3f3c9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"5.5.0"},{"fixed":"5.5.35"},{"introduced":"5.6.0"},{"fixed":"5.6.21"},{"introduced":"7.0.0"},{"fixed":"7.0.6"}]}}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.1","php-5.6.21RC1","php-7.0.0","php-7.0.6RC1","php-8.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"23"}]},{"events":[{"introduced":"0"},{"last_affected":"24"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]}],"vanir_signatures_modified":"2026-04-11T04:02:07Z","vanir_signatures":[{"signature_version":"v1","target":{"file":"src/gd_gd2.c","function":"_gd2GetHeader"},"digest":{"length":2523,"function_hash":"163878100595225240009372061331328833043"},"id":"CVE-2016-3074-081b5b6d","deprecated":false,"source":"https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19","signature_type":"Function"},{"signature_version":"v1","target":{"file":"src/gd_gd2.c"},"digest":{"line_hashes":["308632048764262319325349404959904373833","156654908032796698564829210861782091210","87643980687445443250260216682085309841","74748855092100787267051943652936968299"],"threshold":0.9},"id":"CVE-2016-3074-8c2aa4db","deprecated":false,"source":"https://github.com/libgd/libgd/commit/2bb97f407c1145c850416a3bfbcc8cf124e68a19","signature_type":"Line"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3074.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}