Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
https://secunia.com/secunia_research/2016-9/
https://libgd.github.io/release-2.2.3.html
http://packetstormsecurity.com/files/138174/LibGD-2.2.2-Integer-Overflow-Denial-Of-Service.html
http://www.securitytracker.com/id/1036535
http://www.debian.org/security/2016/dsa-3630
https://bugs.php.net/bug.php?id=72558
http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html
http://www.ubuntu.com/usn/USN-3060-1
http://www.securityfocus.com/bid/92080
https://security.gentoo.org/glsa/201612-09
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.securityfocus.com/archive/1/539100/100/0/threaded
Source: MITRE
Published: 2016-08-12
Updated: 2022-08-29
Type: CWE-119
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 2.8
Severity: MEDIUM