FKIE_CVE-2017-7890
Vulnerability from fkie_nvd - Published: 2017-08-02 19:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| php | php | * | |
| php | php | 7.0.0 | |
| php | php | 7.0.1 | |
| php | php | 7.0.2 | |
| php | php | 7.0.3 | |
| php | php | 7.0.4 | |
| php | php | 7.0.5 | |
| php | php | 7.0.6 | |
| php | php | 7.0.7 | |
| php | php | 7.0.8 | |
| php | php | 7.0.9 | |
| php | php | 7.0.10 | |
| php | php | 7.0.11 | |
| php | php | 7.0.12 | |
| php | php | 7.0.13 | |
| php | php | 7.0.14 | |
| php | php | 7.0.15 | |
| php | php | 7.0.16 | |
| php | php | 7.0.17 | |
| php | php | 7.0.18 | |
| php | php | 7.0.19 | |
| php | php | 7.0.20 | |
| php | php | 7.1.0 | |
| php | php | 7.1.1 | |
| php | php | 7.1.2 | |
| php | php | 7.1.3 | |
| php | php | 7.1.4 | |
| php | php | 7.1.5 | |
| php | php | 7.1.6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"matchCriteriaId": "399EA21A-9B46-4F4F-9A33-4DC557B11743",
"versionEndIncluding": "5.6.30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6890AF-8A0A-46EE-AAD5-CF9AAE14A321",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B90B947-7B54-47F3-9637-2F4AC44079EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35848414-BD5D-4164-84DC-61ABBB1C4152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1F8402-8551-4F66-A9A7-81D472AB058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A773E8E-48CD-4D35-A0FD-629BD9334486",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FC492340-79AF-4676-A161-079A97EC6F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C2D8FE-C380-4B43-B634-A3DBA4700A71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB58393-0C10-413C-8D95-6BAA8BC19A1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "751F51CA-9D88-4971-A6EC-8C0B72E8E22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "37B74118-8FC2-44CB-9673-A83DF777B2E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4D56A200-1477-40DA-9444-CFC946157C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FD0D1CCC-A857-4C15-899E-08F9255CEE34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6745CC43-2836-4CD8-848F-EEA08AE9D5AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7BEB6696-14F9-4D9B-9974-B682FFBB828E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "04146390-021D-4147-9830-9EAA90D120A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5B124547-DC1D-4A92-B8AB-8A1900063786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F45B2127-CF3D-4D59-9042-AE6DF2908319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "29A450E3-931F-4487-A76D-80A38210297A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C099A0C4-883D-42ED-8359-FFD3ADD692A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD07432-5A23-491E-892E-42F0F58307D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "19627ECC-9342-4917-8FCC-7757339E3242",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0C68AA43-ED90-4B98-A5F8-4E210C2CC7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2466D297-9442-40B0-A1A7-F9D166396CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EADBF7EE-18DC-49F9-BF2F-A09BBAE76F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1726E9B6-A7FA-402B-A911-0CE81C623087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3670FF7-2CA3-41A4-92FE-0123497E4E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1C22CE03-DFE5-4CD3-B229-10B219A55434",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C258AF27-84DF-4FC3-A651-1349BB567FB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information."
},
{
"lang": "es",
"value": "La funci\u00f3n de descodificaci\u00f3n de GIF \"gdImageCreateFromGifCtx \" en gd_gif_in.c en GD Graphics Library (tambi\u00e9n conocido como libgd),que se usa en PHP en versiones anteriores a la 5.6.31 y en todas las 7.x anteriores a la 7.1.7, no asigna el valor cero a los objetos array colorMap antes de usarse. Una imagen GIF especialmente manipulada podr\u00eda utilizar las tablas no inicializadas para leer sobre 700 bytes por encima de la pila, pudiendo divulgar informaci\u00f3n sensible."
}
],
"id": "CVE-2017-7890",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-08-02T19:29:00.897",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://php.net/ChangeLog-5.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://php.net/ChangeLog-7.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2017/dsa-3938"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99492"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:0406"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:1296"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://bugs.php.net/bug.php?id=74435"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugs.php.net/patch-display.php?bug=74435\u0026patch=fix-74435-php-7.0\u0026revision=1497970038"
},
{
"source": "cve@mitre.org",
"url": "https://security.netapp.com/advisory/ntap-20180112-0001/"
},
{
"source": "cve@mitre.org",
"url": "https://www.tenable.com/security/tns-2017-12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://php.net/ChangeLog-5.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "http://php.net/ChangeLog-7.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2017/dsa-3938"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99492"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:0406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:1296"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://bugs.php.net/bug.php?id=74435"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugs.php.net/patch-display.php?bug=74435\u0026patch=fix-74435-php-7.0\u0026revision=1497970038"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20180112-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.tenable.com/security/tns-2017-12"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…