Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
References
Configurations
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174876.html - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/135034/giflib-5.1.1-Heap-Overflow.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Dec/83 - Exploit | |
References | () http://www-01.ibm.com/support/docview.wss?uid=isg3T1023474 - | |
References | () http://www.securityfocus.com/archive/1/537171/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/81697 - | |
References | () http://www.securitytracker.com/id/1035331 - | |
References | () https://source.android.com/security/bulletin/2017-05-01 - |
Information
Published : 2016-04-13 15:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7555
Mitre link : CVE-2015-7555
CVE.ORG link : CVE-2015-7555
JSON object : View
Products Affected
fedoraproject
- fedora
giflib_project
- giflib
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer