Short Name |
HTTP:PHP:PHP-OUTOFBOUND |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
PHP gdImageCreateFromGifCtx Out of Bounds Read |
Release Date |
2017/07/27 |
Update Number |
2970 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
An out of bounds read vulnerability has been reported in PHP. A remote attacker could exploit this vulnerability by supplying a crafted image file to an application using the affected function. Successful exploitation of this vulnerability could lead to information disclosure.
The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.