[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:009 -- Mandriva gif2png

ID: oval:org.secpod.oval:def:300390Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




A vulnerability has been found and corrected in gif2png: Stack-based buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow context-dependent attackers to execute arbitrary code via a long command-line argument, as demonstrated by a CGI program that launches gif2png . Buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow context-dependent attackers to cause a denial of service or have unspecified other impact via a GIF file that contains many images, leading to long extensions such as .p100 for PNG output files, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018 . Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.0
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Product:
gif2png
Reference:
MDVSA-2011:009
CVE-2010-4694
CVE-2009-5018
CVE    2
CVE-2009-5018
CVE-2010-4694
CPE    3
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2010.1
cpe:/o:mandriva:linux:2010.0

© SecPod Technologies