Lucene search

K
gentooGentoo FoundationGLSA-200511-03
HistoryNov 04, 2005 - 12:00 a.m.

giflib: Multiple vulnerabilities

2005-11-0400:00:00
Gentoo Foundation
security.gentoo.org
8

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.033 Low

EPSS

Percentile

91.4%

Background

giflib is a library for reading and writing GIF images.

Description

Chris Evans and Daniel Eisenbud independently discovered two out-of-bounds memory write operations and a NULL pointer dereference in giflib.

Impact

An attacker could craft a malicious GIF image and entice users to load it using an application making use of the giflib library, resulting in an application crash or potentially the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All giflib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/giflib-4.1.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/giflib< 4.1.4UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.033 Low

EPSS

Percentile

91.4%