Buffer overflow in APNGDis 2.8 and earlier allows a remote attackers to cause denial of service and possibly execute arbitrary code via a crafted image containing a malformed chunk size descriptor.
References
Link | Resource |
---|---|
https://www.onvio.nl/nieuws/cve-2017-6191-apngdis-chunk-size-descriptor-buffer-overflow | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/41668/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41669/ | Exploit VDB Entry Third Party Advisory |
http://www.securityfocus.com/bid/97053 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-02-20 08:29
Updated : 2020-04-29 05:56
NVD link : CVE-2017-6192
Mitre link : CVE-2017-6192
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
apng_disassembler_project
- apng_disassembler