CVE Reference: CVE-2009-5018

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2009-5018

Description:
Stack-based buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow context-dependent attackers to execute arbitrary code via a long command-line argument, as demonstrated by a CGI program that launches gif2png.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/64820

SAID
  Secunia Advisory: SA42796

MLIST
  http://openwall.com/lists/oss-security/2010/11/22/3
  http://openwall.com/lists/oss-security/2010/11/22/12
  http://openwall.com/lists/oss-security/2010/11/22/1
  http://openwall.com/lists/oss-security/2010/11/21/1

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2011:009

GENTOO
  http://security.gentoo.org/glsa/glsa-201101-01.xml

FULLDISC
  http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/072009.html

FEDORA
  http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051229.html

CONFIRM
  http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?root=extras&view=log
  http://bugs.gentoo.org/show_bug.cgi?id=346501
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978

BID
  41801


Return to the previous page.