First published: Fri Aug 27 2021(Updated: )
ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MiniUPnP | =0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36530 is classified as a high severity vulnerability due to its potential for heap overflow exploitation.
To fix CVE-2021-36530, you should upgrade ngiflib to a version that addresses this vulnerability, specifically any version after 0.4.
CVE-2021-36530 affects systems that utilize ngiflib version 0.4, particularly those operating in NGIFLIB_NO_FILE mode.
A heap overflow occurs when too much data is written to a buffer on the heap, potentially allowing attackers to execute arbitrary code.
Yes, CVE-2021-36530 can potentially be exploited remotely if an adversary can control the input to the vulnerable GetByteStr() function.