
Cloud Vulnerability DB
A community-led vulnerabilities database
In HTMLDOC 1.9.14, a security vulnerability was identified involving an infinite loop in the gifreadlzw function that could lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow. The vulnerability was assigned CVE-2022-24191 and was discovered in January 2022 (MITRE CVE).
The vulnerability occurs due to an infinite loop in the gifreadlzw function where the 'sp' variable, which belongs to heap memory, can be arbitrarily modified. The issue manifests in a loop where 'sp' is consistently incremented until it reaches out of heap memory bounds, causing a crash. The problematic code involves a while loop that continues as long as 'code >= clear_code', where *sp++ operations are performed without proper bounds checking (GitHub Issue).
The vulnerability could allow an attacker to cause a denial of service condition or potentially execute arbitrary code. When exploited, the buffer overflow condition could lead to system crashes or potential code execution in the context of the application (Ubuntu Security).
The vulnerability has been fixed in HTMLDOC version 1.9.15. Various Linux distributions have released security updates to address this issue, including Fedora 34 which updated to version 1.9.15-1.fc34 (Fedora Update), and Ubuntu which has released patches for multiple affected versions (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."