An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2937-1 gif2apng security update
EUVD EUVD EUVD-2021-32625 An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written.
Ubuntu USN Ubuntu USN USN-5969-1 gif2apng vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:54:31.054Z

Reserved: 2021-12-28T00:00:00

Link: CVE-2021-45910

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-28T01:15:07.560

Modified: 2024-11-21T06:33:15.263

Link: CVE-2021-45910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses