Impact
Imager versions through 1.030 for Perl expose a heap out of bounds write when processing crafted multi‑frame GIF files due to a missing bounds check in the GIF reader component. The flaw occurs in the skip‑image branch that calls DGifGetLine without validating the destination buffer size, allowing an attacker to write beyond the allocated memory region. This memory corruption can lead to application crashes or, in more severe cases, arbitrary code execution because the compromised memory may control return addresses or data structures.
Affected Systems
The vulnerability affects products from TONYC, specifically the Imager library for Perl versions up to and including 1.030. Any Perl application that processes GIF images via Imager and is unable to restrict input size or validate frames is at risk. The vendor recommends upgrading to Imager 1.031 or later to obtain the patch that correctly bounds the buffer checks.
Risk and Exploitability
The exploit requires delivery of a specially crafted multi‑frame GIF file to a vulnerable application that uses Imager for image processing. The attack does not need network privilege unless the GIF is transmitted remotely; local users could also trigger the flaw by opening a malicious file. While there is no EPSS data and the vulnerability is not listed in KEV, the nature of a heap out‑of‑bounds write is considered a medium‑severity issue, as indicated by its CVSS score of 6.5, which can compromise confidentiality, integrity, or availability of the host. Immediate remediation is recommended to mitigate the potential for arbitrary code execution.
OpenCVE Enrichment