CVE-2009-0749Use After Free in Project Optipng

CWE-416Use After Free7 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.4%
top 38.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 2
Latest updateMay 2

Description

Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted GIF image that causes the realloc function to return a new pointer, which triggers memory corruption when the old pointer is accessed.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Debianoptipng_project/optipng< 0.6.2.1-1+3
NVDopensuse/opensuse10.311.1

Also affects: Linux Enterprise 9-11

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pmrr-7vvq-vpj6: Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread2022-05-02
OSV
CVE-2009-0749: Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread2009-03-02
CVEList
CVE-2009-0749: Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread2009-03-02

📋Vendor Advisories

2
Debian
CVE-2009-0749: optipng - Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxter...2009
Red Hat
optipng: memory re-allocation flaw in GIF reader

💬Community

1
Bugzilla
CVE-2009-0749 optipng: memory re-allocation flaw in GIF reader2009-02-25
CVE-2009-0749 — Use After Free in Project Optipng | cvebase