{"id":"CVE-2016-5767","details":"Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.","modified":"2026-04-16T06:17:39.910983741Z","published":"2016-08-07T10:59:14.960Z","related":["SUSE-SU-2016:1842-1","SUSE-SU-2016:2013-1","SUSE-SU-2016:2080-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"},{"type":"WEB","url":"https://bugs.php.net/bug.php?id=72446"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91395"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-5.php"},{"type":"ADVISORY","url":"http://php.net/ChangeLog-7.php"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/06/23/4"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2598.html"},{"type":"FIX","url":"http://github.com/php/php-src/commit/c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6?w=1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"last_affected":"486e81dea9844d02aacf7e3e6eae7d8b75ec26b3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.33"}]}},{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"fixed":"c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6"}]}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9"],"database_specific":{"vanir_signatures_modified":"2026-04-11T04:02:22Z","vanir_signatures":[{"signature_version":"v1","deprecated":false,"signature_type":"Function","id":"CVE-2016-5767-6bd33d8a","target":{"file":"ext/gd/libgd/gd.c","function":"gdImageCreate"},"digest":{"length":1344,"function_hash":"56026588670328373046956429696843236929"},"source":"https://github.com/php/php-src/commit/c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5767.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}