vendor:
gif2apng
by:
Hamm3r.py
7.8
CVSS
HIGH
Stack-Buffer Overflow
119
CWE
Product Name: gif2apng
Affected Version From: 1.9
Affected Version To: 1.9
Patch Exists: NO
Related CWE: N/A
CPE: a:gif2apng:gif2apng:1.9
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 16.04
2018
gif2apng 1.9 ‘.gif’ Stack-Buffer Overflow
gif2apng is vulnerable to a stack based buffer overflow when a malformed gif is supplied. Following is the stack trace: $ ./gif2apng fuzz.gif gif2apng 1.9 using 7ZIP with 15 iterations Reading 'fuzz.gif'... Address 0x7fffb183bcf1 is located in stack of thread T0 at offset 16977 in frame #0 0x4eb23f (/home/shyam/FUZZ/gif2apng+0x4eb23f). This frame has 6 object(s): [32, 36) 'size' [48, 8242) 'prefix' [8512, 12609) 'suffix' [12880, 16977) 'str' <== Memory access at offset 16977 overflows this variable [17248, 18272) 'data' [18400, 18401) 'mincodesize'
Mitigation:
Input validation should be done to ensure that the input is valid and does not contain malicious data.