An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 | mailing list exploit third party advisory issue tracking |