Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-31344

Опубликовано: 14 апр. 2025
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C. This issue affects giflib: through 5.2.2.

A flaw was found in the gif2rgb utility of giflib. This vulnerability allows an attacker to cause a heap-based buffer overflow via crafted GIF files. The issue arises due to improper handling of certain GIF image data, leading to memory corruption.​

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of OpenJDK 11java-11-openjdk-portableFix deferred
Red Hat build of OpenJDK 17java-17-openjdk-portableFix deferred
Red Hat build of OpenJDK 1.8java-1.8.0-openjdk-portableFix deferred
Red Hat build of OpenJDK 21java-21-openjdk-portable-rhel7Fix deferred
Red Hat Enterprise Linux 10giflibFix deferred
Red Hat Enterprise Linux 10java-21-openjdkFix deferred
Red Hat Enterprise Linux 6giflibFix deferred
Red Hat Enterprise Linux 7giflibFix deferred
Red Hat Enterprise Linux 7java-1.8.0-openjdkFix deferred
Red Hat Enterprise Linux 8giflibFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2359418giflib: The giflib open-source component has a buffer overflow vulnerability

EPSS

Процентиль: 2%
0.00016
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
2 месяца назад

Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C. This issue affects giflib: through 5.2.2.

CVSS3: 7.3
nvd
2 месяца назад

Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C. This issue affects giflib: through 5.2.2.

CVSS3: 7.3
msrc
около 2 месяцев назад

Описание отсутствует

CVSS3: 7.3
debian
2 месяца назад

Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. ...

suse-cvrf
2 месяца назад

Security update for giflib

EPSS

Процентиль: 2%
0.00016
Низкий

5.9 Medium

CVSS3