First published: Tue Oct 17 2017(Updated: )
A global buffer overflow in OptiPNG 0.7.6 allows remote attackers to cause a denial-of-service attack or other unspecified impact with a maliciously crafted GIF format file, related to an uncontrolled loop in the LZWReadByte function of the gifread.c file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/optipng | <=0.7.6-1<=0.7.5-1 | 0.7.6-1.1 0.7.6-1+deb9u1 0.7.5-1+deb8u2 |
debian/optipng | 0.7.7-1 0.7.7-2 0.7.7-3 | |
OptiPNG | =0.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16938 has a high severity due to its potential to cause a denial-of-service attack.
To fix CVE-2017-16938, update OptiPNG to version 0.7.7 or later.
OptiPNG versions 0.7.6 and earlier are affected by CVE-2017-16938.
CVE-2017-16938 does not directly indicate remote code execution but allows for denial-of-service which could lead to further exploits.
While CVE-2017-16938 is documented in Debian, it can affect any system running the vulnerable versions of OptiPNG.