5 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

28 Dec 2021 — An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. Se ha detectado un problema en gif2apng versión 1.9. Se presenta un desbordamiento del búfer en la región stack de la memoria que implica un bucle while. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

28 Dec 2021 — An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer. Se ha detectado un problema en gif2apng versión 1.9. Se presenta una vulnerabilidad de desbordamiento de búfer en la región heap de la memoria en la función DecodeLZW. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002668 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

28 Dec 2021 — An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written. Se ha detectado un problema en gif2apng versión 1.9. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002667 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

28 Dec 2021 — An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow in the main function. It allows an attacker to write 2 bytes outside the boundaries of the buffer. Se ha detectado un problema en gif2apng versión 1.9. Se presenta un desbordamiento del búfer en la región heap de la memoria en la función main. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002687 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

28 Dec 2021 — An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a for loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. Se ha detectado un problema en gif2apng versión 1.9. Se presenta un desbordamiento del búfer en la región stack de la memoria que implica un bucle for. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 • CWE-787: Out-of-bounds Write •