Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-2896
Description:The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI- Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
Test IDs: 1.3.6.1.4.1.25623.1.0.70157   1.3.6.1.4.1.25623.1.0.70197   1.3.6.1.4.1.25623.1.0.70149   1.3.6.1.4.1.25623.1.0.70203   1.3.6.1.4.1.25623.1.0.70200   1.3.6.1.4.1.25623.1.0.70144   1.3.6.1.4.1.25623.1.0.70314   1.3.6.1.4.1.25623.1.0.70486   1.3.6.1.4.1.25623.1.0.70936   1.3.6.1.4.1.25623.1.0.71120   1.3.6.1.4.1.25623.1.0.71154   1.3.6.1.4.1.25623.1.0.72004   1.3.6.1.4.1.25623.1.0.72058   1.3.6.1.4.1.25623.1.0.123973   1.3.6.1.4.1.25623.1.0.122039   1.3.6.1.4.1.25623.1.0.831465   1.3.6.1.4.1.25623.1.0.863486   1.3.6.1.4.1.25623.1.0.863867   1.3.6.1.4.1.25623.1.0.863467   1.3.6.1.4.1.25623.1.0.870561   1.3.6.1.4.1.25623.1.0.863485   1.3.6.1.4.1.25623.1.0.870611   1.3.6.1.4.1.25623.1.0.840753   1.3.6.1.4.1.25623.1.0.863935   1.3.6.1.4.1.25623.1.0.831473   1.3.6.1.4.1.25623.1.0.864009  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-2896
BugTraq ID: 49148
http://www.securityfocus.com/bid/49148
Debian Security Information: DSA-2354 (Google Search)
http://www.debian.org/security/2011/dsa-2354
Debian Security Information: DSA-2426 (Google Search)
http://www.debian.org/security/2012/dsa-2426
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064873.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064600.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065550.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065651.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065527.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065539.html
http://security.gentoo.org/glsa/glsa-201209-23.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2011:146
http://www.mandriva.com/security/advisories?name=MDVSA-2011:167
http://www.openwall.com/lists/oss-security/2011/08/10/10
RedHat Security Advisories: RHSA-2011:1635
http://www.redhat.com/support/errata/RHSA-2011-1635.html
RedHat Security Advisories: RHSA-2012:1180
http://rhn.redhat.com/errata/RHSA-2012-1180.html
RedHat Security Advisories: RHSA-2012:1181
http://rhn.redhat.com/errata/RHSA-2012-1181.html
http://www.securitytracker.com/id?1025929
http://secunia.com/advisories/45621
http://secunia.com/advisories/45900
http://secunia.com/advisories/45945
http://secunia.com/advisories/45948
http://secunia.com/advisories/46024
http://secunia.com/advisories/48236
http://secunia.com/advisories/48308
http://secunia.com/advisories/50737
http://www.ubuntu.com/usn/USN-1207-1
http://www.ubuntu.com/usn/USN-1214-1




© 1998-2021 E-Soft Inc. All rights reserved.