Description
Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size.
Published: 2026-03-18
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A buffer overflow in the EGifGCBToExtension function of giflib version 5.2.2 allows a remote attacker to overwrite the memory of an existing Graphic Control Extension block when it fails to validate the block's allocated size. The flaw can be triggered by a malicious GIF file, resulting in a denial of service by crashing the application or terminating the associated process. This attack targets memory integrity, reflected in CWE‑787. The impact is a loss of availability for any service relying on giflib to process GIF images.

Affected Systems

The vulnerability affects the giflib library, version 5.2.2, distributed by giflib_project. Systems that integrate this specific library and decode GIF files may be susceptible. No other vendors or version ranges were identified in the advisory.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity rating, while the EPSS score of less than 1 percent suggests a low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, which further indicates that no widespread, active exploitation is known. The likely attack surface is remote, through a crafted GIF file that a user or client submits to a process using giflib. These conditions mean that administrators of affected systems should treat the issue carefully, applying a fix and monitoring for attempts to exploit the overflow.

Generated by OpenCVE AI on March 21, 2026 at 06:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade giflib to the latest available release that contains a fix for the EGifGCBToExtension buffer overflow.
  • If upgrading is not immediately possible, implement a workaround by validating the size of any Graphic Control Extension block before passing it to EGifGCBToExtension or by limiting processing to trusted GIF sources.
  • Continuously monitor application logs for repeated failures or abnormal GIF parsing activity and apply additional controls if suspicious activity is detected.

Generated by OpenCVE AI on March 21, 2026 at 06:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
First Time appeared Giflib Project
Giflib Project giflib
CPEs cpe:2.3:a:giflib_project:giflib:5.2.2:*:*:*:*:*:*:*
Vendors & Products Giflib Project
Giflib Project giflib

Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Giflib
Giflib giflib
Vendors & Products Giflib
Giflib giflib

Thu, 19 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Title giflib: giflib: Denial of Service via buffer overflow in EGifGCBToExtension
References
Metrics threat_severity

None

threat_severity

Important


Wed, 18 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size.
References

Subscriptions

Giflib Giflib
Giflib Project Giflib
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-18T18:44:14.358Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26740

cve-icon Vulnrichment

Updated: 2026-03-18T18:42:29.023Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T18:16:26.220

Modified: 2026-03-21T00:09:00.920

Link: CVE-2026-26740

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-26740 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:53:58Z

Weaknesses