This exploit demonstrates a stack-based buffer overflow in gif2apng 1.9 when processing a malformed GIF file. The proof-of-concept triggers an AddressSanitizer stack-buffer-overflow error, indicating potential for arbitrary code execution.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:gif2apng 1.9
No auth needed
Prerequisites:A malformed GIF file · Target system running gif2apng 1.9