7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.0005 Low
EPSS
Percentile
15.1%
Debian LTS Advisory DLA-3677-1 [email protected]
https://www.debian.org/lts/security/ Adrian Bunk
November 30, 2023 https://wiki.debian.org/LTS
Package : gimp-dds
Version : 3.0.1-1+deb10u1
CVE ID : CVE-2023-44441
File parsing heap buffer overflow was fixed in gimp-dds,
a DDS (DirectDraw Surface) plugin for GIMP.
For Debian 10 buster, this problem has been fixed in version
3.0.1-1+deb10u1.
We recommend that you upgrade your gimp-dds packages.
For the detailed security status of gimp-dds please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gimp-dds
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | gimp-dds | <Â 3.0.1-1+deb10u1 | gimp-dds_3.0.1-1+deb10u1_all.deb |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7 High
AI Score
Confidence
High
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.0005 Low
EPSS
Percentile
15.1%