CVE-2021-45910

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-45910
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-45910.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-45910
Related
Published
2021-12-28T01:15:07Z
Modified
2024-09-18T03:17:04.848586Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written.

References

Affected packages

Debian:11 / gif2apng

Package

Name
gif2apng
Purl
pkg:deb/debian/gif2apng?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9+srconly-3+deb11u1

Affected versions

1.*

1.9+srconly-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}