Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Gif2apng
(Gif2apng_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-12-28 | CVE-2021-45909 | An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer. | Debian_linux, Gif2apng | 7.8 | ||
2021-12-28 | CVE-2021-45910 | An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written. | Debian_linux, Gif2apng | 7.8 | ||
2021-12-28 | CVE-2021-45911 | An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow in the main function. It allows an attacker to write 2 bytes outside the boundaries of the buffer. | Debian_linux, Gif2apng | 7.8 | ||
2021-12-28 | CVE-2021-45907 | An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a for loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. | Gif2apng | 7.8 | ||
2021-12-28 | CVE-2021-45908 | An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. | Gif2apng | 7.8 |