Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7505

Опубликовано: 18 фев. 2020
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libnsgifremovedpackage
libnsgifno-dsasqueezepackage
netsurffixed3.2+dfsg-3package
netsurfno-dsajessiepackage
netsurfno-dsawheezypackage

Примечания

  • http://source.netsurf-browser.org/libnsgif.git/commit/?id=a268d2c15252ac58c19f1b19771822c66bcf73b2

EPSS

Процентиль: 73%
0.00792
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

Stack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.

CVSS3: 8.8
nvd
почти 6 лет назад

Stack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.

github
больше 3 лет назад

Stack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.

EPSS

Процентиль: 73%
0.00792
Низкий