Impact
The CGIF GIF image handler contains a flaw in its cgif_addframe function where maliciously crafted width or height parameters lead to an integer overflow. This overflow can disrupt memory handling, potentially causing a crash or other unpredictable behavior that results in a denial of service. The weakness corresponds to insufficient bounds checking and mathematical precision errors (CWE‑189, CWE‑190).
Affected Systems
Versions of the CGIF component distributed by dloebl up to and including 0.5.2 are vulnerable. Systems that embed these CGIF libraries for GIF processing without upgrading or patching are at risk. No other vendors or product versions are indicated as affected.
Risk and Exploitability
The CVSS base score of 5.3 denotes moderate severity. No EPSS data are available, and the vulnerability is not listed in the CISA KEV catalog, which suggests it is not widely exploited yet. The description states that the attack may be initiated remotely, indicating that an external user can trigger the overflow by supplying a crafted GIF image to the vulnerable function. No privilege escalation is required, so the impact is limited to service availability rather than confidentiality or integrity compromise.
OpenCVE Enrichment