Lucene search

K
gentooGentoo FoundationGLSA-201203-15
HistoryMar 16, 2012 - 12:00 a.m.

gif2png: Multiple vulnerabilities

2012-03-1600:00:00
Gentoo Foundation
security.gentoo.org
14

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

89.1%

Background

gif2png converts images from GIF format to PNG format.

Description

Two vulnerabilities have been found in gif2png:

  • A boundary error in gif2png.c could cause a buffer overflow (CVE-2010-4694).
  • The patch for CVE-2009-5018 causes gif2png to truncate GIF pathnames (CVE-2010-4695).

Impact

A remote attacker could entice a user to open a specially crafted GIF file, possibly resulting in execution of arbitrary code, a Denial of Service condition, or the creation of PNG files in unintended directories.

Workaround

There is no known workaround at this time.

Resolution

All gif2png users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/gif2png-2.5.8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/gif2png< 2.5.8UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

89.1%