Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6961

Опубликовано: 17 мар. 2017
Источник: debian

Описание

An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apng2giffixed1.8-0.1package
apng2gifnot-affectedjessiepackage
apng2gifnot-affectedwheezypackage

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.

CVSS3: 5.5
nvd
почти 9 лет назад

An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.

CVSS3: 5.5
github
больше 3 лет назад

An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.