{"id":"CVE-2016-6128","details":"The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.","modified":"2026-04-16T06:18:48.929482870Z","published":"2016-08-07T10:59:22.650Z","related":["SUSE-SU-2016:2303-1","SUSE-SU-2016:2408-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","openSUSE-SU-2024:10062-1"],"references":[{"type":"ADVISORY","url":"https://libgd.github.io/release-2.2.3.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3619"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/06/30/1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-09"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91509"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036276"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3030-1"},{"type":"REPORT","url":"https://github.com/libgd/libgd/commit/6ff72ae40c7c20ece939afb362d98cc37f4a1c96"},{"type":"REPORT","url":"https://bugs.php.net/72494"},{"type":"FIX","url":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"last_affected":"ec6b61f591b949a1431280899f21c098ffe8ec14"},{"fixed":"1ccfe21e14c4d18336f9da8515cd17db88c3de61"},{"fixed":"6ff72ae40c7c20ece939afb362d98cc37f4a1c96"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.2.2"}]}},{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.1","gd-2.2.0","gd-2.2.1","gd-2.2.2","php-8.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6128.json","vanir_signatures":[{"source":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61","digest":{"function_hash":"234391009720094549110791023187180360736","length":1365},"deprecated":false,"id":"CVE-2016-6128-0ce6ddf1","target":{"function":"gdImageCropThreshold","file":"src/gd_crop.c"},"signature_type":"Function","signature_version":"v1"},{"target":{"file":"src/gd_crop.c"},"digest":{"threshold":0.9,"line_hashes":["9126538461335498973293204557157608054","103533780240159628767177034044645754241","299426492980770477306086057184964756836"]},"source":"https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61","id":"CVE-2016-6128-2db1fdc0","signature_version":"v1","signature_type":"Line","deprecated":false}],"vanir_signatures_modified":"2026-04-11T04:02:25Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}