An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2911-1 | apng2gif security update |
EUVD |
EUVD-2017-15999 | An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854441 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:49:02.881Z
Reserved: 2017-03-17T00:00:00
Link: CVE-2017-6961
No data.
Status : Deferred
Published: 2017-03-17T09:59:00.287
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-6961
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD