You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.
A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421.
Issue-Label Bot is automatically applying the label bug to this issue, with a confidence of 0.79. Please mark this comment with 👍 or 👎 to give our bot feedback!
CVE-2017-18120 - High Severity Vulnerability
Create, manipulate, and optimize GIF images and animations
Library home page: https://github.com/kohler/gifsicle.git
Found in HEAD commit: bb38138afd18608fdd479021f598d41d60a143e6
* The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.
A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421.
Publish Date: 2018-02-02
URL: CVE-2017-18120
Base Score Metrics:
Type: Change files
Origin: kohler/gifsicle@118a460
Release Date: 2017-12-03
Fix Resolution: Replace or update the following file: gifread.c
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: