CVE-2016-3977

NameCVE-2016-3977
DescriptionHeap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs820526

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
giflib (PTS)jessie4.1.6-11+deb8u1vulnerable
stretch5.1.4-0.4vulnerable
buster, sid5.1.4-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
giflibsource(unstable)5.1.4-3medium820526

Notes

[stretch] - giflib <no-dsa> (Minor issue)
[jessie] - giflib <no-dsa> (Minor issue)
[wheezy] - giflib <no-dsa> (minor issue)
https://sourceforge.net/p/giflib/bugs/87/
https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/
The issue was originally fixed in 5.1.4-0.3 but then the NMU upload
5.1.4-0.4 just dropped the patch claiming the patch was already present
which is untrue and reopening the issue.

Search for package or bug name: Reporting problems