First published: Wed Oct 14 2009(Updated: )
A certain Fedora patch for gif2png.c in gif2png 2.5.1 and 2.5.2, as distributed in gif2png-2.5.1-1200.fc12 on Fedora 12 and gif2png_2.5.2-1 on Debian GNU/Linux, truncates a GIF pathname specified on the command line, which might allow remote attackers to create PNG files in unintended directories via a crafted command-line argument, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GIF2PNG Project | =2.5.1 | |
GIF2PNG Project | =2.5.2 | |
Debian GNU/Linux | ||
Fedora | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4695 is classified as a medium severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2010-4695, update gif2png to version 2.5.3 or later, which addresses the truncation issue.
CVE-2010-4695 affects gif2png versions 2.5.1 and 2.5.2.
CVE-2010-4695 does not directly lead to remote code execution, but it may allow unauthorized file manipulation.
CVE-2010-4695 has been noted in Fedora 12 and Debian distributions.