{"id":"CVE-2017-6961","details":"An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk-\u003esize value (within the PNG file) to determine the amount of memory to allocate.","modified":"2026-03-12T22:39:45.033154Z","published":"2017-03-17T09:59:00.287Z","references":[{"type":"REPORT","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854441"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6961.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.7"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}