{"id":"CVE-2016-6207","details":"Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.","modified":"2026-04-16T06:19:26.123905007Z","published":"2016-08-12T15:59:03.730Z","related":["SUSE-SU-2016:2303-1","SUSE-SU-2016:2408-1","SUSE-SU-2016:2460-1","SUSE-SU-2016:2460-2","openSUSE-SU-2024:10062-1"],"references":[{"type":"ADVISORY","url":"https://secunia.com/secunia_research/2016-9/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-09"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3630"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92080"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3060-1"},{"type":"ADVISORY","url":"https://libgd.github.io/release-2.2.3.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2750.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/539100/100/0/threaded"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=72558"},{"type":"FIX","url":"http://www.securitytracker.com/id/1036535"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"last_affected":"ec6b61f591b949a1431280899f21c098ffe8ec14"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.2.2"}]}},{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"},{"introduced":"2c2d0de09e522fe097bfcebfb758171eb6aa5270"},{"fixed":"bcd100d812b525c982cf75d6c6dabe839f61634a"},{"introduced":"fc1df8e7a6886e29a6ed5bef3f674ac61164e847"},{"fixed":"38980c9ea4156ce52a53f9f3e1007ea3d787fa11"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"9d582eba7448f1495fae62b13d95d2844ce6b28a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"5.5.0"},{"fixed":"5.5.38"},{"introduced":"5.6.0"},{"fixed":"5.6.24"},{"introduced":"7.0.0"},{"fixed":"7.0.9"}]}}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.1","gd-2.2.0","gd-2.2.1","gd-2.2.2","php-5.6.24RC1","php-7.0.9RC1","php-8.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]}],"vanir_signatures":[{"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["198011536025072107975883186380452148843","331728417024842654446570071457159069395","205456331668105326830182380336029223146","164282985402725457749299583506046134408","320137256578601229186691392718001358014"]},"id":"CVE-2016-6207-b7259250","deprecated":false,"target":{"file":"ext/standard/basic_functions.c"},"source":"https://github.com/php/php-src/commit/9d582eba7448f1495fae62b13d95d2844ce6b28a"}],"vanir_signatures_modified":"2026-04-11T04:02:30Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6207.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}