CVE-2017-6961

An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 35%
VendorProductVersion
apng2gif_projectapng2gif
1.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apng2gif
bullseye
1.8-2
fixed
jessie
not-affected
wheezy
not-affected
bookworm
1.8-4
fixed
sid
1.8-5
fixed
trixie
1.8-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apng2gif
noble
Fixed 1.8-0.1
released
mantic
Fixed 1.8-0.1
released
lunar
Fixed 1.8-0.1
released
kinetic
Fixed 1.8-0.1
released
jammy
Fixed 1.8-0.1
released
impish
Fixed 1.8-0.1
released
hirsute
Fixed 1.8-0.1
released
groovy
Fixed 1.8-0.1
released
focal
Fixed 1.8-0.1
released
eoan
Fixed 1.8-0.1
released
disco
Fixed 1.8-0.1
released
cosmic
ignored
bionic
needed
artful
ignored
zesty
ignored
yakkety
ignored
xenial
not-affected
trusty
dne
precise
ignored