// For flags

CVE-2010-4695

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A certain Fedora patch for gif2png.c in gif2png 2.5.1 and 2.5.2, as distributed in gif2png-2.5.1-1200.fc12 on Fedora 12 and gif2png_2.5.2-1 on Debian GNU/Linux, truncates a GIF pathname specified on the command line, which might allow remote attackers to create PNG files in unintended directories via a crafted command-line argument, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018.

Un parche de Fedora para gif2png.c en gif2png v2.5.1 y v2.5.2, tal y como se distribuye en gif2png-2.5.1-1200.fc12 pata Fedora 12 y gif2png_2.5.2 1-en para Debian GNU/Linux, trunca una ruta GIF especificada en la línea de comandos, lo que podría permitir a atacantes remotos crear archivos PNG en directorios no deseados a través de un argumento de línea de comandos debidamente modificado, como lo demuestra un programa CGI que lanza gif2png, una vulnerabilidad diferente a CVE-2009-5018.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-01-14 CVE Reserved
  • 2011-01-14 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Catb
Search vendor "Catb"
Gif2png
Search vendor "Catb" for product "Gif2png"
2.5.1
Search vendor "Catb" for product "Gif2png" and version "2.5.1"
-
Affected
in Debian
Search vendor "Debian"
Linux
Search vendor "Debian" for product "Linux"
*-
Safe
Catb
Search vendor "Catb"
Gif2png
Search vendor "Catb" for product "Gif2png"
2.5.1
Search vendor "Catb" for product "Gif2png" and version "2.5.1"
-
Affected
in Redhat
Search vendor "Redhat"
Fedora
Search vendor "Redhat" for product "Fedora"
12
Search vendor "Redhat" for product "Fedora" and version "12"
-
Safe
Catb
Search vendor "Catb"
Gif2png
Search vendor "Catb" for product "Gif2png"
2.5.2
Search vendor "Catb" for product "Gif2png" and version "2.5.2"
-
Affected
in Debian
Search vendor "Debian"
Linux
Search vendor "Debian" for product "Linux"
*-
Safe
Catb
Search vendor "Catb"
Gif2png
Search vendor "Catb" for product "Gif2png"
2.5.2
Search vendor "Catb" for product "Gif2png" and version "2.5.2"
-
Affected
in Redhat
Search vendor "Redhat"
Fedora
Search vendor "Redhat" for product "Fedora"
12
Search vendor "Redhat" for product "Fedora" and version "12"
-
Safe