Vulnerability Name: | CVE-2021-46829 (CCN-231968) | ||||||||||||||||||||
Assigned: | 2022-07-24 | ||||||||||||||||||||
Published: | 2022-07-24 | ||||||||||||||||||||
Updated: | 2022-10-27 | ||||||||||||||||||||
Summary: | GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems. | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-46829 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20220725 Re: CVE Request: heap buffer overflow in gdk-pixbuf Source: XF Type: UNKNOWN gnome-cve202146829-bo(231968) Source: MISC Type: Exploit, Third Party Advisory https://github.com/pedrib/PoC/blob/master/fuzzing/CVE-2021-46829/CVE-2021-46829.md Source: MISC Type: Patch, Third Party Advisory https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/5398f04d772f7f8baf5265715696ed88db0f0512 Source: MISC Type: Patch, Third Party Advisory https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bca00032ad68d0b0aa2c1f7558db931e52bd9cd2 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/190 Source: CCN Type: gdk-pixbuf GIT Repository gif: Check for overflow when compositing or clearing frames. Source: MISC Type: Exploit, Third Party Advisory https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/121 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-7254ec5e96 Source: CCN Type: oss-sec Mailing List, Mon, 25 Jul 2022 12:15:40 +0700 Re: CVE Request: heap buffer overflow in gdk-pixbuf Source: DEBIAN Type: Third Party Advisory DSA-5228 Source: MISC Type: Mailing List, Third Party Advisory https://www.openwall.com/lists/oss-security/2022/07/23/1 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |