Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 21 Nov 2010 16:45:26 -0700
From: Kurt Seifried <>
Subject: CVE Request: gif2png: command-line buffer overflow problem

This is from 2009 but doesn't appear to have a CVE (no "gif2png" in
the CVE database).


A buffer overflow in gif2png 2.5.3 and earlier allows an attacker to
execute arbitrary code via a long command line argument passed to the
gif2png binary.

It was first claimed that it was fixed in 2.5.2 but it is reported
that it isn't fixed, I tested 2.5.3 and it still seg faults the same
way as 2.5.2 so it would appear it was never fixed, as the software
was last updated in 2005 I guess this one never gets fixed.

Kurt Seifried
tel: 1-703-879-3176

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ