|Main Archive Page > Month Archives > oss-security archives|
> How could this possibly be exploited? If you can trick a user into
> running gif2png [exploit payload], then that user has already lost.
It was reported that some CGI scripts/etc use it automatically so by
using a long file name it may be possible.
Personally I'm not worried but Debian/Fedora have fixed it as a
security issue so if that is the case a CVE would be nice for tracking
> See also:
> make `perl -e 'print "A"x10000'`
-- Kurt Seifried email@example.com tel: 1-703-879-3176