Description
An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2911-1 | apng2gif security update |
EUVD |
EUVD-2017-15999 | An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate. |
References
| Link | Providers |
|---|---|
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854441 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:49:02.881Z
Reserved: 2017-03-17T00:00:00.000Z
Link: CVE-2017-6961
No data.
Status : Deferred
Published: 2017-03-17T09:59:00.287
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-6961
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD