Buffer overflow in APNGDis 2.8 and earlier allows a remote attackers to cause denial of service and possibly execute arbitrary code via a crafted image containing a malformed chunk size descriptor.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97053 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41668/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41669/ | Exploit VDB Entry Third Party Advisory |
https://www.onvio.nl/nieuws/cve-2017-6191-apngdis-chunk-size-descriptor-buffer-overflow | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-20 16:29
Updated : 2024-02-04 19:46
NVD link : CVE-2017-6192
Mitre link : CVE-2017-6192
CVE.ORG link : CVE-2017-6192
JSON object : View
Products Affected
apng_disassembler_project
- apng_disassembler
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer