An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854441 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-03-17T08:55:00
Updated: 2024-08-05T15:49:02.881Z
Reserved: 2017-03-17T00:00:00
Link: CVE-2017-6961
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-03-17T09:59:00.287
Modified: 2024-11-21T03:30:52.157
Link: CVE-2017-6961
Redhat
No data.