giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
References
Configurations
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/ - | |
References | () https://sourceforge.net/p/giflib/bugs/166/ - Exploit, Issue Tracking | |
Summary |
|
Information
Published : 2023-08-25 14:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39742
Mitre link : CVE-2023-39742
CVE.ORG link : CVE-2023-39742
JSON object : View
Products Affected
giflib_project
- giflib
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')