Vulnerability Description
The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to 250 bytes outside of the allocated buffer with arbitrary data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Giftrans Project | Giftrans | 1.12.2 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://web.archive.org/web/20150801185019/Broken Link
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002739ExploitMailing ListThird Party Advisory
- https://www.abdn.ac.uk/tools/ibmpc/giftrans/index.htiBroken Link
- http://web.archive.org/web/20150801185019/Broken Link
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002739ExploitMailing ListThird Party Advisory
- https://www.abdn.ac.uk/tools/ibmpc/giftrans/index.htiBroken Link
FAQ
What is CVE-2021-45972?
CVE-2021-45972 is a vulnerability with a CVSS score of 7.1 (HIGH). The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to...
How severe is CVE-2021-45972?
CVE-2021-45972 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-45972?
Check the references section above for vendor advisories and patch information. Affected products include: Giftrans Project Giftrans, Debian Debian Linux.