
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in gif2apng version 1.9, identified as CVE-2021-45911. The vulnerability was reported on December 27, 2021, affecting the main function of the application where it processes delays in GIF to APNG conversion (NVD, Ubuntu Security). The issue allows an attacker to write 2 bytes outside the boundaries of the buffer.
The vulnerability exists in the main function of gif2apng 1.9 where the delays buffer processing occurs. The issue arises when the program enters an if statement at the end of the GIF file, where the variable 'n' equals 'frames', causing a write operation that overwrites two bytes after the delays buffer. The vulnerability has a CVSS v3.1 base score of 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
When exploited, this vulnerability can lead to a denial of service (system crash) and potential arbitrary code execution due to the heap-based buffer overflow. The impact affects the system's confidentiality, integrity, and availability, all rated as High in the CVSS scoring (Ubuntu Security Notice).
The vulnerability has been fixed in multiple distributions: Ubuntu 20.04 (version 1.9+srconly-3ubuntu0.1), Ubuntu 18.04 (version 1.9+srconly-2ubuntu0.1), and Ubuntu 16.04 (version 1.7-3ubuntu0.1~esm1). Debian has also released fixes in versions 1.9+srconly-2+deb10u1 and 1.9+srconly-3+deb11u1. Users are recommended to upgrade their gif2apng packages to these patched versions (Ubuntu Security Notice, Debian LTS Announce).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."