First published: Sun Oct 01 2023(Updated: )
OptiPNG v0.7.7 was discovered to contain a global buffer overflow via the 'buffer' variable at gifread.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Optipng Project Optipng | =0.7.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43907 is high, with a severity value of 7.8.
The affected software for CVE-2023-43907 is OptiPNG v0.7.7.
To fix the buffer overflow vulnerability in OptiPNG v0.7.7, it is recommended to update to a patched version or apply the latest security patches provided by the OptiPNG project.
The Common Weakness Enumeration (CWE) ID for CVE-2023-43907 is CWE-119 and CWE-120.
More information about CVE-2023-43907 can be found at the following references: [Link 1](http://optipng.sourceforge.net/), [Link 2](https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md), [Link 3](https://sourceforge.net/projects/optipng/files/OptiPNG/optipng-0.7.7/optipng-0.7.7.tar.gz/download?use_mirror=udomain&download=).