Lucene search

K
centosCentOS ProjectCESA-2013:1778
HistoryDec 03, 2013 - 10:52 p.m.

gimp security update

2013-12-0322:52:31
CentOS Project
lists.centos.org
46

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.764 High

EPSS

Percentile

98.2%

CentOS Errata and Security Advisory CESA-2013:1778

The GIMP (GNU Image Manipulation Program) is an image composition and
editing program.

A stack-based buffer overflow flaw, a heap-based buffer overflow, and an
integer overflow flaw were found in the way GIMP loaded certain X Window
System (XWD) image dump files. A remote attacker could provide a specially
crafted XWD image file that, when processed, would cause the XWD plug-in to
crash or, potentially, execute arbitrary code with the privileges of the
user running the GIMP. (CVE-2012-5576, CVE-2013-1913, CVE-2013-1978)

The CVE-2013-1913 and CVE-2013-1978 issues were discovered by Murray
McAllister of the Red Hat Security Response Team.

Users of the GIMP are advised to upgrade to these updated packages, which
correct these issues. The GIMP must be restarted for the update to take
effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-December/082196.html
https://lists.centos.org/pipermail/centos-announce/2013-December/082202.html

Affected packages:
gimp
gimp-devel
gimp-devel-tools
gimp-help-browser
gimp-libs

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1778

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.764 High

EPSS

Percentile

98.2%