Description
An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2911-1 | apng2gif security update |
EUVD |
EUVD-2017-15999 | An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate. |
References
| Link | Providers |
|---|---|
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854441 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:49:02.881Z
Reserved: 2017-03-17T00:00:00.000Z
Link: CVE-2017-6961
No data.
Status : Modified
Published: 2017-03-17T09:59:00.287
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-6961
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD