First published: Tue Aug 10 2021(Updated: )
A heap-based buffer overflow in the sixel_encoder_output_without_macro function in encoder.c of Libsixel 1.8.4 allows attackers to cause a denial of service (DOS) via converting a crafted PNG file into Sixel format.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libsixel Project Libsixel | =1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-21677.
The title of this vulnerability is 'A heap-based buffer overflow in the sixel_encoder_output_without_macro function in encoder.c of Libsixel 1.8.4'.
The affected software is Libsixel 1.8.4.
The severity of this vulnerability is medium with a CVSS score of 6.5.
Attackers can exploit this vulnerability by converting a crafted PNG file into Sixel format.