|Main Archive Page > Month Archives > oss-security archives|
How could this possibly be exploited? If you can trick a user into
running gif2png [exploit payload], then that user has already lost.
make `perl -e 'print "A"x10000'`
On Sun, Nov 21, 2010 at 6:45 PM, Kurt Seifried <firstname.lastname@example.org> wrote:
> This is from 2009 but doesn't appear to have a CVE (no "gif2png" in
> the CVE database).
> A buffer overflow in gif2png 2.5.3 and earlier allows an attacker to
> execute arbitrary code via a long command line argument passed to the
> gif2png binary.
> It was first claimed that it was fixed in 2.5.2 but it is reported
> that it isn't fixed, I tested 2.5.3 and it still seg faults the same
> way as 2.5.2 so it would appear it was never fixed, as the software
> was last updated in 2005 I guess this one never gets fixed.
> Kurt Seifried
> tel: 1-703-879-3176