Miggo Logo

CVE-2022-23435:
android-gif-drawable vulerable to denial of service due to unrestricted comment length

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.54244%
Published
1/20/2022
Updated
1/13/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
pl.droidsonroids.gif:android-gif-drawablemaven< 1.2.241.2.24

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the getComment function in decoding.c, which handled comment parsing without enforcing a maximum length limit. The GitHub patch explicitly adds a COMMENT_LENGTH_MAX check in this function, and the CWE-770 (resource allocation without throttling) directly maps to this unbounded memory allocation behavior. The commit diff shows the vulnerable code flow: original implementation used 'len = Bytes[0]' and 'reallocarray(info->comment, len + offset + 1)' without validation, making it the clear attack vector.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

***o*in*.* in *n*roi*-*i*-*r*w**l* ***or* *.*.** *o*s not limit t** m*ximum l*n*t* o* * *omm*nt, l***in* to **ni*l o* s*rvi**.

Reasoning

T** vuln*r**ility st*ms *rom t** **t*omm*nt *un*tion in ***o*in*.*, w*i** **n*l** *omm*nt p*rsin* wit*out *n*or*in* * m*ximum l*n*t* limit. T** *it*u* p*t** *xpli*itly ***s * *OMM*NT_L*N*T*_M*X ****k in t*is *un*tion, *n* t** *W*-*** (r*sour** *llo**