// For flags

CVE-2011-2896

David Koblas' GIF decoder LZW decoder buffer overflow

Severity Score

5.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.

El descompresor LZW en (1) la función LWZReadByte en giftoppm.c en el David Koblas GIF decoder en PBMPLUS, tal y como se utiliza en la función gif_read_lzw en filter/image-gif.c en CUPS antes de la versión v1.4.7, (2) la función LZWReadByte en plug-ins/common/file-gif-load.c en GIMP v2.6.11 y anteriores, (3) la función LZWReadByte en img/gifread.c en XPCE en SWI-Prolog v5.10.4 y anteriores, y (4) otros productos, no controla correctamente las palabras de código que están ausentes de la tabla de descompresión, lo que permite provocar a atacantes remotos un bucle infinito o un desbordamiento de búfer basado en memoria dinámica (heap), y posiblemente, ejecutar código de su elección, a través de un flujo o fichero comprimido debidamente modificado. Se trata de un problema relacionado con los CVE-2006-1168 y CVE-2011 2895.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-07-27 CVE Reserved
  • 2011-08-19 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-10-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
References (33)
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Swi-prolog
Search vendor "Swi-prolog"
Swi-prolog
Search vendor "Swi-prolog" for product "Swi-prolog"
<= 5.10.4
Search vendor "Swi-prolog" for product "Swi-prolog" and version " <= 5.10.4"
-
Affected
Apple
Search vendor "Apple"
Cups
Search vendor "Apple" for product "Cups"
<= 1.4.6
Search vendor "Apple" for product "Cups" and version " <= 1.4.6"
-
Affected
Gimp
Search vendor "Gimp"
Gimp
Search vendor "Gimp" for product "Gimp"
<= 2.6.11
Search vendor "Gimp" for product "Gimp" and version " <= 2.6.11"
-
Affected