9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.072 Low
EPSS
Percentile
94.0%
CentOS Errata and Security Advisory CESA-2012:1181
The GIMP (GNU Image Manipulation Program) is an image composition and
editing program.
Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in the GIMP’s Adobe Photoshop (PSD) image file plug-in. An
attacker could create a specially-crafted PSD image file that, when opened,
could cause the PSD plug-in to crash or, potentially, execute arbitrary
code with the privileges of the user running the GIMP. (CVE-2009-3909,
CVE-2012-3402)
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the GIMP’s GIF image format plug-in. An attacker could create a
specially-crafted GIF image file that, when opened, could cause the GIF
plug-in to crash or, potentially, execute arbitrary code with the
privileges of the user running the GIMP. (CVE-2012-3481)
A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW)
decompression algorithm implementation used by the GIMP’s GIF image format
plug-in. An attacker could create a specially-crafted GIF image file that,
when opened, could cause the GIF plug-in to crash or, potentially, execute
arbitrary code with the privileges of the user running the GIMP.
(CVE-2011-2896)
A heap-based buffer overflow flaw was found in the GIMP’s KiSS CEL file
format plug-in. An attacker could create a specially-crafted KiSS palette
file that, when opened, could cause the CEL plug-in to crash or,
potentially, execute arbitrary code with the privileges of the user running
the GIMP. (CVE-2012-3403)
Red Hat would like to thank Secunia Research for reporting CVE-2009-3909,
and Matthias Weckbecker of the SUSE Security Team for reporting
CVE-2012-3481.
Users of the GIMP are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. The GIMP must be
restarted for the update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-August/080971.html
Affected packages:
gimp
gimp-devel
gimp-libs
Upstream details at:
https://access.redhat.com/errata/RHSA-2012:1181
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | i386 | gimp | < 2.2.13-2.0.7.el5_8.5 | gimp-2.2.13-2.0.7.el5_8.5.i386.rpm |
CentOS | 5 | i386 | gimp-devel | < 2.2.13-2.0.7.el5_8.5 | gimp-devel-2.2.13-2.0.7.el5_8.5.i386.rpm |
CentOS | 5 | i386 | gimp-libs | < 2.2.13-2.0.7.el5_8.5 | gimp-libs-2.2.13-2.0.7.el5_8.5.i386.rpm |
CentOS | 5 | x86_64 | gimp | < 2.2.13-2.0.7.el5_8.5 | gimp-2.2.13-2.0.7.el5_8.5.x86_64.rpm |
CentOS | 5 | i386 | gimp-devel | < 2.2.13-2.0.7.el5_8.5 | gimp-devel-2.2.13-2.0.7.el5_8.5.i386.rpm |
CentOS | 5 | x86_64 | gimp-devel | < 2.2.13-2.0.7.el5_8.5 | gimp-devel-2.2.13-2.0.7.el5_8.5.x86_64.rpm |
CentOS | 5 | i386 | gimp-libs | < 2.2.13-2.0.7.el5_8.5 | gimp-libs-2.2.13-2.0.7.el5_8.5.i386.rpm |
CentOS | 5 | x86_64 | gimp-libs | < 2.2.13-2.0.7.el5_8.5 | gimp-libs-2.2.13-2.0.7.el5_8.5.x86_64.rpm |