CVE-2023-43907
Published: 1 October 2023
OptiPNG v0.7.7 was discovered to contain a global buffer overflow via the 'buffer' variable at gifread.c.
Notes
Author | Note |
---|---|
Priority reason: Denial of service only in command-line tool |
|
mdeslaur | Can't reproduce with PoC on focal, jammy, and lunar. This is an out-of-bounds read in a command-line tool, unlikely to have any security impact. as of 2023-10-10, there is no fix available from the optipng developers |
Priority
Status
Package | Release | Status |
---|---|---|
optipng Launchpad, Ubuntu, Debian |
bionic |
Deferred
(2023-10-10)
|
focal |
Deferred
(2023-10-10)
|
|
jammy |
Deferred
(2023-10-10)
|
|
lunar |
Ignored
(end of life, was deferred [2023-10-10])
|
|
mantic |
Deferred
(2023-10-10)
|
|
noble |
Deferred
(2023-10-10)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Deferred
(2023-10-10)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
- https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
- http://optipng.sourceforge.net/
- https://sourceforge.net/projects/optipng/files/OptiPNG/optipng-0.7.7/optipng-0.7.7.tar.gz/download?use_mirror=udomain&download=
- https://www.cve.org/CVERecord?id=CVE-2023-43907
- NVD
- Launchpad
- Debian