
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was identified in GifLib version 5.2.1, specifically in the DumpScreen2RGB function within gif2rgb.c. The vulnerability allows a local attacker to obtain sensitive information through the function's execution (NVD). The vulnerability was discovered in November 2023 and assigned a CVSS v3.1 base score of 7.1 (High) (NVD, Ubuntu).
The vulnerability exists between lines 321 and 323 of the gif2rgb.c component. It manifests as a heap buffer overflow during the image-saving process when handling specially crafted GIF files. This issue is distinct from CVE-2022-28506, and the previous fix (commit [5b74cd]) does not address this particular overflow problem. The vulnerability has been assigned a CVSS v3.1 vector of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H (NVD, TACE).
The vulnerability can lead to sensitive information disclosure and potential system crashes. When exploited, it causes a heap-based buffer overflow, which could result in memory corruption and program termination. The issue specifically affects the gif2rgb command-line tool's functionality (Ubuntu, Debian).
As of June 2024, while the issue has been acknowledged, it remains unfixed in the main repository. A potential fix involves freeing 'Buffers' in the error case of the DumpScreen2RGB function, as suggested in a patch submitted to the project (GifLib Bug).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."