First published: Mon Apr 11 2016(Updated: )
A heap buffer overflow vulnerability was found in giflib. A maliciously crafted gif file could cause the application to crash. External references: <a href="https://sourceforge.net/p/giflib/bugs/87/">https://sourceforge.net/p/giflib/bugs/87/</a> Upstream fix: <a href="https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/">https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/</a> References: <a href="http://bugs.fi/2016-03-gif2rgb.txt">http://bugs.fi/2016-03-gif2rgb.txt</a> <a href="http://bugs.fi/media/afl/giflib/1.gif">http://bugs.fi/media/afl/giflib/1.gif</a>
Affected Software | Affected Version | How to fix |
---|---|---|
giflib |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1325771 is classified as a heap buffer overflow vulnerability that can lead to application crashes.
To fix REDHAT-BUG-1325771, you should update giflib to a version that includes the upstream bug fixes addressing this vulnerability.
Exploitation of REDHAT-BUG-1325771 can allow an attacker to crash applications that process maliciously crafted GIF files.
The affected software for REDHAT-BUG-1325771 is giflib.
You can determine if your system is vulnerable to REDHAT-BUG-1325771 by checking the installed version of giflib and comparing it to the fixed versions provided by the updates.