First published: Tue Jun 14 2022(Updated: )
A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5.1.4 allows remote attackers trigger an out of memory exception or denial of service via a gif format file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GifLib Project GifLib | =5.1.4 | |
ubuntu/giflib | <5.1.4-2ubuntu0.1+ | 5.1.4-2ubuntu0.1+ |
ubuntu/giflib | <5.1.9-1ubuntu0.1 | 5.1.9-1ubuntu0.1 |
ubuntu/giflib | <5.1.9-2ubuntu0.1 | 5.1.9-2ubuntu0.1 |
ubuntu/giflib | <5.2.1-2.5ubuntu0.1 | 5.2.1-2.5ubuntu0.1 |
ubuntu/giflib | <5.1.4-0.3~16.04.1+ | 5.1.4-0.3~16.04.1+ |
debian/giflib | <=5.1.9-2<=5.2.1-2.5 | 5.2.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40633 is a memory leak vulnerability in gif2rgb in giflib 5.1.4 that can allow remote attackers to trigger an out of memory exception or denial of service via a gif format file.
CVE-2021-40633 has a severity rating of 8.8, which is considered high.
CVE-2021-40633 affects giflib 5.1.4, causing a memory leak in gif2rgb.
Remote attackers can exploit CVE-2021-40633 by sending a specially crafted gif format file to trigger an out of memory exception or denial of service.
Yes, updating to a version of giflib that is not affected by the vulnerability (5.1.5 or later) will resolve CVE-2021-40633.