CVE-2009-5018

gif2png <= 2.5.3 - Stack-based Buffer Overflow via Long Command-line Argument

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-5018. PoCs published by Razuel Akaharnath.

AI-analyzed exploit summary The exploit demonstrates a buffer overflow in gif2png by supplying an overly long argument (1053 'A' characters), which can lead to arbitrary code execution or denial-of-service. The PoC is minimal but effectively triggers the vulnerability.

Description

Stack-based buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow context-dependent attackers to execute arbitrary code via a long command-line argument, as demonstrated by a CGI program that launches gif2png.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Razuel Akaharnath · textdoslinux
https://www.exploit-db.com/exploits/34356

The exploit demonstrates a buffer overflow in gif2png by supplying an overly long argument (1053 'A' characters), which can lead to arbitrary code execution or denial-of-service. The PoC is minimal but effectively triggers the vulnerability.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: gif2png 2.5.2
No auth needed
Prerequisites: gif2png installed on the target system
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (18)

Core 18
Core References
Exploit, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=547515
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0023
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2011:009
Mailing List mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2010/11/22/12
Mailing List mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2010/11/22/3
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/42796
Issue Tracking x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=346501
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/41801
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/3036
Patch mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2010/11/21/1
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0107
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-201101-01.xml
Patch mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2010/11/22/1
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/64820

Scores

EPSS 0.2206
EPSS Percentile 95.9%

Details

CWE
CWE-119
Status published
Products (36)
catb/gif2png 0.99
catb/gif2png 1.0.0
catb/gif2png 1.1.0
catb/gif2png 1.1.1
catb/gif2png 1.2.0
catb/gif2png 1.2.1
catb/gif2png 1.2.2
catb/gif2png 2.0.0
catb/gif2png 2.0.1
catb/gif2png 2.0.2
... and 26 more
Published Jan 14, 2011
Tracked Since Feb 18, 2026