Chris Evans reported several issues with libungif to vendor-sec. They have been fixed in libungif-4.1.4, but not noted as security issues. "I believe that the recently released libungif-4.1.4 fixes these crashes. Credit here must go to Daniel Eisenbud who independently noticed libungif crashes _and_ patched it to fix it."
These issue should also affect RHEL2.1 and RHEL3
bad1.gif trigger a NULL dereference crash CVE-2005-2974 libungif NULL pointer deref bad2 and bad3 trigger out of bounds memory access crashes. bad2 may possibly allow for arbitrary code execution as it's an OOB write. CVE-2005-3350 libungif OOB access
Created attachment 120493 [details] Patch which fixes these issues.
Lifting embargo
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-828.html