The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/91743 | vdb entry third party advisory |
http://libgd.github.io/release-2.2.3.html | |
http://lists.opensuse.org/opensuse-updates/2016-08/msg00121.html | third party advisory vendor advisory |
https://github.com/libgd/libgd/issues/248 | issue tracking patch |
https://github.com/libgd/libgd/pull/251 | issue tracking patch |
https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186 | issue tracking patch |
https://github.com/libgd/libgd/commit/01c61f8ab110a77ae64b5ca67c244c728c506f03 | issue tracking patch |
http://www.openwall.com/lists/oss-security/2016/08/23/1 | third party advisory mailing list |