Impact
Giflib contains a double‑free bug triggered by a shallow copy in GifMakeSavedImage combined with incorrect error handling. When this sequence occurs the same memory block is freed twice, corrupting the heap and potentially allowing an attacker to crash the application or execute arbitrary code if they can influence the contents of the freed memory. The CVE description notes that triggering this vulnerability is difficult, but the possibility remains.
Affected Systems
The flaw resides in the giflib library, which provides GIF image support. No specific product or version numbers are disclosed in the CVE, so any installation that contains the affected code path is potentially impacted.
Risk and Exploitability
The vulnerability has a CVSS score of 5.1, indicating a moderate risk. The EPSS score is below 1%, suggesting a very low probability of exploitation. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector involves an application that can load crafted GIF files, and the conditions required to trigger the double‑free are difficult, so real‑world exploitation is considered unlikely at present.
OpenCVE Enrichment