Search for vulnerabilities
Vulnerability details: VCID-3y4n-zzn6-aaaq
Vulnerability ID VCID-3y4n-zzn6-aaaq
Aliases CVE-2017-7890
Summary The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7890.html
generic_textual Medium http://php.net/ChangeLog-5.php
generic_textual Low http://php.net/ChangeLog-7.php
rhas Moderate https://access.redhat.com/errata/RHSA-2018:0406
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json
epss 0.03269 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.0388 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.111 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.12238 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.12238 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.12238 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.19468 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.19468 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
epss 0.29787 https://api.first.org/data/v1/epss?cve=CVE-2017-7890
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1473822
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890
cvssv2 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2017-7890
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2017-7890
generic_textual Medium https://ubuntu.com/security/notices/USN-3389-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3389-2
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7890.html
http://php.net/ChangeLog-5.php
http://php.net/ChangeLog-7.php
https://access.redhat.com/errata/RHSA-2018:1296
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json
https://api.first.org/data/v1/epss?cve=CVE-2017-7890
https://bugs.php.net/bug.php?id=74435
https://bugs.php.net/patch-display.php?bug=74435&patch=fix-74435-php-7.0&revision=1497970038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.netapp.com/advisory/ntap-20180112-0001/
https://ubuntu.com/security/notices/USN-3389-1
https://ubuntu.com/security/notices/USN-3389-2
https://www.tenable.com/security/tns-2017-12
http://www.debian.org/security/2017/dsa-3938
http://www.securityfocus.com/bid/99492
1473822 https://bugzilla.redhat.com/show_bug.cgi?id=1473822
869263 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869263
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:*
CVE-2017-7890 https://nvd.nist.gov/vuln/detail/CVE-2017-7890
RHSA-2018:0406 https://access.redhat.com/errata/RHSA-2018:0406
USN-3389-1 https://usn.ubuntu.com/3389-1/
USN-3389-2 https://usn.ubuntu.com/3389-2/
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7890.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-7890
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-7890
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.78416
EPSS Score 0.03269
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.