Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2010-4695
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
A certain Fedora patch for gif2png.c in gif2png 2.5.1 and 2.5.2, as distributed in gif2png-2.5.1-1200.fc12 on Fedora 12 and gif2png_2.5.2-1 on Debian GNU/Linux, truncates a GIF pathname specified on the command line, which might allow remote attackers to create PNG files in unintended directories via a crafted command-line argument, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:catb:gif2png:2.5.1:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:catb:gif2png:2.5.2:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:debian:linux:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:redhat:fedora:12:*:*:*:*:*:*:* |
No
|
- |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051229.html
- http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?root=extra
- https://bugzilla.redhat.com/show_bug.cgi?id=547515
- http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?root=extra
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978
- http://www.securityfocus.com/bid/45920
- http://security.gentoo.org/glsa/glsa-201203-15.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64819