An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854441 | Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-03-17T08:55:00
Updated: 2017-03-17T08:57:01
Reserved: 2017-03-17T00:00:00
Link: CVE-2017-6961
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-03-17T09:59:00.287
Modified: 2017-03-20T16:58:37.873
Link: CVE-2017-6961
JSON object: View
Redhat Information
No data.
CWE