漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
漏洞信息
N/A
漏洞
N/A
漏洞
GNU Gimp 'LZWReadByte()' GIF图形解析缓冲区错误漏洞
漏洞信息
GIMP(GNU Image Manipulation Program,GNU图像处理程序)是GIMP团队开发的一套跨平台的开源图像处理软件。该软件能够实现多种图像处理,包括照片润饰、图像合成和图像创建等。 Gimp的“LZWReadByte()”函数(plug-ins/common/file-gif-load.c)在处理GIF图形时存在缓冲区溢出漏洞。远程攻击者可通过欺骗用户打开特制的GIF图像导致缓冲区溢出。
漏洞信息
N/A
漏洞
N/A