CVE-2017-6961

EUVD-2017-15999
An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
Affected Products (NVD)
VendorProductVersion
apng2gif_projectapng2gif
1.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apng2gif
bookworm
1.8-4
fixed
bullseye
1.8-2
fixed
jessie
not-affected
sid
1.8-5
fixed
trixie
1.8-5
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apng2gif
artful
ignored
bionic
needed
cosmic
ignored
disco
Fixed 1.8-0.1
released
eoan
Fixed 1.8-0.1
released
focal
Fixed 1.8-0.1
released
groovy
Fixed 1.8-0.1
released
hirsute
Fixed 1.8-0.1
released
impish
Fixed 1.8-0.1
released
jammy
Fixed 1.8-0.1
released
kinetic
Fixed 1.8-0.1
released
lunar
Fixed 1.8-0.1
released
mantic
Fixed 1.8-0.1
released
noble
Fixed 1.8-0.1
released
precise
ignored
trusty
dne
xenial
not-affected
yakkety
ignored
zesty
ignored