SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   zgv Vendors:   Marks, Russell
zgv Buffer Overflow in 'readgif.c' in Processing Animated GIFs May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012546
SecurityTracker URL:  http://securitytracker.com/id/1012546
CVE Reference:   CVE-2004-0999   (Links to External Site)
Date:  Dec 16 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.8
Description:   A buffer overflow vulnerability was reported in zgv in the processing of certain types of GIF images. A remote user may be able to execute arbitrary code.

Debian reported that a remote user can create a specially crafted, multiple-image (i.e., animated) GIF image that, when processed by zgv, will trigger a segmentation fault in zgv. A remote user may be able to cause arbitrary code to be executed with the privileges of the user running zgv.

The overflow resides in 'src/readgif.c'

Mikulas Patocka is credited with discovering this flaw.

Impact:   A remote user may be able to execute arbitrary code on the target system with the privileges of the zgv process.
Solution:   The vendor has issued a patch, available at:

http://www.svgalib.org/rus/zgv/zgv-5.8-integer-overflow-fix.diff

Vendor URL:  www.svgalib.org/rus/zgv/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 16 2004 (Debian Issues Fix) zgv Buffer Overflow in 'readgif.c' in Processing Animated GIFs May Let Remote Users Execute Arbitrary Code
Debian has released a fix.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC