HomeSwi-PrologCVE-2011-2896

CVE-2011-2896

UNKNOWN
5.1CVSS
Published: 2011-08-19
Updated: 2025-04-11
AI Analysis

Description

The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.

CVSS Metrics

Vector
AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector
network
Access Cmplx
high
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
CWE-787

Metadata

Primary Vendor
SWI-PROLOG
Published
8/19/2011
Last Modified
4/11/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

swi-prolog : swi-prologapple : cupsgimp : gimp

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2011-2896 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com