CVE-2015-7505

NameCVE-2015-7505
DescriptionStack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs810491

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
netsurf (PTS)jessie3.2+dfsg-2vulnerable
stretch3.6-3.1fixed
sid3.6-3.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnsgifsource(unstable)(unfixed)
netsurfsource(unstable)3.2+dfsg-3810491

Notes

[squeeze] - libnsgif <no-dsa> (Library not used anywhere in Debian)
http://source.netsurf-browser.org/libnsgif.git/commit/?id=a268d2c15252ac58c19f1b19771822c66bcf73b2
[jessie] - netsurf <no-dsa> (netsurf already relies only entirely unsupported mozjs)
[wheezy] - netsurf <no-dsa> (netsurf already relies only entirely unsupported mozjs)

Search for package or bug name: Reporting problems