Published: 24/11/2017 Updated: 04/02/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A global buffer overflow in OptiPNG 0.7.6 allows remote malicious users to cause a denial-of-service attack or other unspecified impact with a maliciously crafted GIF format file, related to an uncontrolled loop in the LZWReadByte function of the gifread.c file.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

optipng project optipng 0.7.6

Vendor Advisories

Two vulnerabilities were discovered in optipng, an advanced PNG optimizer, which may result in denial of service or the execution of arbitrary code if a malformed file is processed For the oldstable distribution (jessie), these problems have been fixed in version 075-1+deb8u2 For the stable distribution (stretch), these problems have been fixed ...
Debian Bug report logs - #878839 optipng: CVE-2017-16938: global-buffer-overflow bug while parsing GIF file Package: optipng; Maintainer for optipng is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Source for optipng is src:optipng (PTS, buildd, popcon) Reported by: Joonun Jang <joonunjang ...
Debian Bug report logs - #882032 optipng: CVE-2017-1000229: Integer Overflow Bug while parsing TIFF input file Package: src:optipng; Maintainer for src:optipng is Debian PhotoTools Maintainers <pkg-phototools-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 17 Nov 2017 1 ...
An invalid memory write flaw was found in the way OptiPNG handles processing of GIF files This flaw could potentially be used to crash the OptiPNG program by tricking it into processing crafted GIF files ...