CVE-2021-45910

An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
VendorProductVersion
gif2apng_projectgif2apng
1.9
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gif2apng
bullseye
1.9+srconly-3+deb11u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gif2apng
impish
ignored
hirsute
ignored
focal
Fixed 1.9+srconly-3ubuntu0.1
released
bionic
Fixed 1.9+srconly-2ubuntu0.1
released
xenial
Fixed 1.7-3ubuntu0.1~esm1
released
trusty
ignored