Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-2896
Description:The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI- Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
Test IDs: 1.3.6.1.4.1.25623.1.0.122039   1.3.6.1.4.1.25623.1.0.864009   1.3.6.1.4.1.25623.1.0.870561   1.3.6.1.4.1.25623.1.0.870611   1.3.6.1.4.1.25623.1.0.863486   1.3.6.1.4.1.25623.1.0.71154   1.3.6.1.4.1.25623.1.0.123973   1.3.6.1.4.1.25623.1.0.863467   1.3.6.1.4.1.25623.1.0.70314   1.3.6.1.4.1.25623.1.0.70157   1.3.6.1.4.1.25623.1.0.72058   1.3.6.1.4.1.25623.1.0.70197   1.3.6.1.4.1.25623.1.0.70203   1.3.6.1.4.1.25623.1.0.831465   1.3.6.1.4.1.25623.1.0.71120   1.3.6.1.4.1.25623.1.0.70936   1.3.6.1.4.1.25623.1.0.72004   1.3.6.1.4.1.25623.1.0.70144   1.3.6.1.4.1.25623.1.0.863935   1.3.6.1.4.1.25623.1.0.863485   1.3.6.1.4.1.25623.1.0.863867   1.3.6.1.4.1.25623.1.0.70200   1.3.6.1.4.1.25623.1.0.840753   1.3.6.1.4.1.25623.1.0.70149   1.3.6.1.4.1.25623.1.0.831473   1.3.6.1.4.1.25623.1.0.70486  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-2896
1025929
http://www.securitytracker.com/id?1025929
45621
http://secunia.com/advisories/45621
45900
http://secunia.com/advisories/45900
45945
http://secunia.com/advisories/45945
45948
http://secunia.com/advisories/45948
46024
http://secunia.com/advisories/46024
48236
http://secunia.com/advisories/48236
48308
http://secunia.com/advisories/48308
49148
http://www.securityfocus.com/bid/49148
50737
http://secunia.com/advisories/50737
DSA-2354
http://www.debian.org/security/2011/dsa-2354
DSA-2426
http://www.debian.org/security/2012/dsa-2426
FEDORA-2011-11173
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064873.html
FEDORA-2011-11197
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064600.html
FEDORA-2011-11221
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065550.html
FEDORA-2011-11229
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065651.html
FEDORA-2011-11305
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065527.html
FEDORA-2011-11318
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065539.html
GLSA-201209-23
http://security.gentoo.org/glsa/glsa-201209-23.xml
MDVSA-2011:146
http://www.mandriva.com/security/advisories?name=MDVSA-2011:146
MDVSA-2011:167
http://www.mandriva.com/security/advisories?name=MDVSA-2011:167
RHSA-2011:1635
http://www.redhat.com/support/errata/RHSA-2011-1635.html
RHSA-2012:1180
http://rhn.redhat.com/errata/RHSA-2012-1180.html
RHSA-2012:1181
http://rhn.redhat.com/errata/RHSA-2012-1181.html
USN-1207-1
http://www.ubuntu.com/usn/USN-1207-1
USN-1214-1
http://www.ubuntu.com/usn/USN-1214-1
[oss-security] 20110810 LZW decompression issues
http://www.openwall.com/lists/oss-security/2011/08/10/10
http://cups.org/str.php?L3867
http://cups.org/str.php?L3867
http://git.gnome.org/browse/gimp/commit/?id=376ad788c1a1c31d40f18494889c383f6909ebfc
http://git.gnome.org/browse/gimp/commit/?id=376ad788c1a1c31d40f18494889c383f6909ebfc
http://www.swi-prolog.org/bugzilla/show_bug.cgi?id=7#c4
http://www.swi-prolog.org/bugzilla/show_bug.cgi?id=7#c4
https://bugzilla.redhat.com/show_bug.cgi?id=727800
https://bugzilla.redhat.com/show_bug.cgi?id=727800
https://bugzilla.redhat.com/show_bug.cgi?id=730338
https://bugzilla.redhat.com/show_bug.cgi?id=730338




© 1998-2025 E-Soft Inc. All rights reserved.