ID USN-1559-1 Type ubuntu Reporter Ubuntu Modified 2012-09-10T00:00:00
Description
Joseph Sheridan discovered that GIMP incorrectly handled certain malformed
headers in FIT files. If a user were tricked into opening a specially
crafted FIT image file, an attacker could cause GIMP to crash.
(CVE-2012-3236)
Murray McAllister discovered that GIMP incorrectly handled malformed KiSS
palette files. If a user were tricked into opening a specially crafted KiSS
palette file, an attacker could cause GIMP to crash, or possibly execute
arbitrary code with the user's privileges. (CVE-2012-3403)
Matthias Weckbecker discovered that GIMP incorrectly handled malformed GIF
image files. If a user were tricked into opening a specially crafted GIF
image file, an attacker could cause GIMP to crash, or possibly execute
arbitrary code with the user's privileges. (CVE-2012-3481)
{"id": "USN-1559-1", "bulletinFamily": "unix", "title": "GIMP vulnerabilities", "description": "Joseph Sheridan discovered that GIMP incorrectly handled certain malformed \nheaders in FIT files. If a user were tricked into opening a specially \ncrafted FIT image file, an attacker could cause GIMP to crash. \n(CVE-2012-3236)\n\nMurray McAllister discovered that GIMP incorrectly handled malformed KiSS \npalette files. If a user were tricked into opening a specially crafted KiSS \npalette file, an attacker could cause GIMP to crash, or possibly execute \narbitrary code with the user's privileges. (CVE-2012-3403)\n\nMatthias Weckbecker discovered that GIMP incorrectly handled malformed GIF \nimage files. If a user were tricked into opening a specially crafted GIF \nimage file, an attacker could cause GIMP to crash, or possibly execute \narbitrary code with the user's privileges. (CVE-2012-3481)", "published": "2012-09-10T00:00:00", "modified": "2012-09-10T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://ubuntu.com/security/notices/USN-1559-1", "reporter": "Ubuntu", "references": ["https://people.canonical.com/~ubuntu-security/cve/CVE-2012-3403", "https://people.canonical.com/~ubuntu-security/cve/CVE-2012-3481", "https://people.canonical.com/~ubuntu-security/cve/CVE-2012-3236"], "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236"], "type": "ubuntu", "lastseen": "2020-07-02T11:36:56", "edition": 5, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-3236", "CVE-2012-3481", "CVE-2012-3403"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12539", "SECURITYVULNS:VULN:12593", "SECURITYVULNS:DOC:28425", "SECURITYVULNS:DOC:28572"]}, {"type": "nessus", "idList": ["FEDORA_2012-12383.NASL", "MANDRIVA_MDVSA-2012-142.NASL", "MANDRIVA_MDVSA-2013-082.NASL", "SOLARIS11_GIMP_20130219.NASL", "FEDORA_2012-12364.NASL", "SL_20120820_GIMP_ON_SL6_X.NASL", "REDHAT-RHSA-2012-1180.NASL", "FEDORA_2012-12293.NASL", "UBUNTU_USN-1559-1.NASL", "OPENSUSE-2012-543.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310864688", "OPENVAS:1361412562310841141", "OPENVAS:831726", "OPENVAS:1361412562310864675", "OPENVAS:841141", "OPENVAS:850318", "OPENVAS:1361412562310850318", "OPENVAS:864688", "OPENVAS:1361412562310831726", "OPENVAS:864675"]}, {"type": "suse", "idList": ["SUSE-SU-2012:1029-1", "OPENSUSE-SU-2012:1080-1", "SUSE-SU-2012:1027-1", "SUSE-SU-2012:1038-1"]}, {"type": "kaspersky", "idList": ["KLA10167"]}, {"type": "gentoo", "idList": ["GLSA-201311-05"]}, {"type": "centos", "idList": ["CESA-2012:1180", "CESA-2012:1181"]}, {"type": "redhat", "idList": ["RHSA-2012:1180", "RHSA-2012:1181"]}, {"type": "oraclelinux", "idList": ["ELSA-2012-1180", "ELSA-2012-1181"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2813-1:44D3F"]}, {"type": "seebug", "idList": ["SSV:73405"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:D5F7525ED72533197171B71A87255AEC"]}, {"type": "exploitdb", "idList": ["EDB-ID:19482"]}], "modified": "2020-07-02T11:36:56", "rev": 2}, "score": {"value": 8.0, "vector": "NONE", "modified": "2020-07-02T11:36:56", "rev": 2}, "vulnersScore": 8.0}, "affectedPackage": [{"OS": "Ubuntu", "OSVersion": "11.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "gimp", "packageVersion": "2.6.11-1ubuntu6.3"}, {"OS": "Ubuntu", "OSVersion": "10.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "gimp", "packageVersion": "2.6.8-2ubuntu1.5"}, {"OS": "Ubuntu", "OSVersion": "11.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "gimp", "packageVersion": "2.6.11-2ubuntu4.1"}, {"OS": "Ubuntu", "OSVersion": "12.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "gimp", "packageVersion": "2.6.12-1ubuntu1.1"}], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:59:50", "description": "fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.", "edition": 6, "cvss3": {}, "published": "2012-07-12T21:55:00", "title": "CVE-2012-3236", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3236"], "modified": "2018-10-30T16:26:00", "cpe": ["cpe:/a:gimp:gimp:2.6.11", "cpe:/a:gnu:gimp:2.7.0", "cpe:/a:gnu:gimp:2.5.0", "cpe:/a:gnu:gimp:2.3.0", "cpe:/a:gnu:gimp:2.4.0", "cpe:/a:gnu:gimp:2.3.3", "cpe:/a:gnu:gimp:2.6.0", "cpe:/a:gnu:gimp:2.2.0", "cpe:/a:gimp:gimp:2.6.8"], "id": "CVE-2012-3236", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3236", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:gnu:gimp:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gimp:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gimp:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gimp:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gimp:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gimp:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:gimp:2.2.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:59:51", "description": "Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.", "edition": 6, "cvss3": {}, "published": "2012-08-25T10:29:00", "title": "CVE-2012-3481", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3481"], "modified": "2013-12-05T05:15:00", "cpe": ["cpe:/a:gimp:gimp:2.4.7", "cpe:/a:gimp:gimp:2.6.11", "cpe:/a:gimp:gimp:2.6.3", "cpe:/a:gimp:gimp:2.6.12", "cpe:/a:gimp:gimp:2.6.2", "cpe:/a:gimp:gimp:2.4.6", "cpe:/a:gimp:gimp:2.6.1", "cpe:/a:gimp:gimp:2.6.5", "cpe:/a:gimp:gimp:2.4.5", "cpe:/a:gimp:gimp:2.8.0", "cpe:/a:gimp:gimp:2.4.1", "cpe:/a:gimp:gimp:2.2.14", "cpe:/a:gimp:gimp:2.4.0", "cpe:/a:gimp:gimp:2.6.9", "cpe:/a:gimp:gimp:2.6.4", "cpe:/a:gimp:gimp:2.6.8", "cpe:/a:gimp:gimp:2.4.2", "cpe:/a:gimp:gimp:2.4.4", "cpe:/a:gimp:gimp:2.6.6", "cpe:/a:gimp:gimp:2.6.0", "cpe:/a:gimp:gimp:2.6.7", "cpe:/a:gimp:gimp:2.6.10", "cpe:/a:gimp:gimp:2.2", "cpe:/a:gimp:gimp:2.4.3", "cpe:/a:gimp:gimp:2.6.13"], "id": "CVE-2012-3481", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3481", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:gimp:gimp:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.7:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:59:51", "description": "Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted KiSS palette file, which triggers an \"invalid free.\"", "edition": 6, "cvss3": {}, "published": "2012-08-25T10:29:00", "title": "CVE-2012-3403", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-3403"], "modified": "2013-12-05T05:15:00", "cpe": ["cpe:/a:gimp:gimp:2.4.7", "cpe:/a:gimp:gimp:2.6.11", "cpe:/a:gimp:gimp:2.6.3", "cpe:/a:gimp:gimp:2.6.12", "cpe:/a:gimp:gimp:2.6.2", "cpe:/a:gimp:gimp:2.4.6", "cpe:/a:gimp:gimp:2.6.1", "cpe:/a:gimp:gimp:2.6.5", "cpe:/a:gimp:gimp:2.4.5", "cpe:/a:gimp:gimp:2.8.0", "cpe:/a:gimp:gimp:2.4.1", "cpe:/a:gimp:gimp:2.2.14", "cpe:/a:gimp:gimp:2.4.0", "cpe:/a:gimp:gimp:2.6.9", "cpe:/a:gimp:gimp:2.6.4", "cpe:/a:gimp:gimp:2.6.8", "cpe:/a:gimp:gimp:2.4.2", "cpe:/a:gimp:gimp:2.4.4", "cpe:/a:gimp:gimp:2.6.6", "cpe:/a:gimp:gimp:2.6.0", "cpe:/a:gimp:gimp:2.6.7", "cpe:/a:gimp:gimp:2.6.10", "cpe:/a:gimp:gimp:2.2", "cpe:/a:gimp:gimp:2.4.3", "cpe:/a:gimp:gimp:2.6.13"], "id": "CVE-2012-3403", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3403", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:gimp:gimp:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gimp:gimp:2.6.7:*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:10:45", "bulletinFamily": "software", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-1559-1\r\nSeptember 10, 2012\r\n\r\ngimp vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 12.04 LTS\r\n- Ubuntu 11.10\r\n- Ubuntu 11.04\r\n- Ubuntu 10.04 LTS\r\n\r\nSummary:\r\n\r\nGIMP could be made to crash or run programs as your login if it opened a\r\nspecially crafted file.\r\n\r\nSoftware Description:\r\n- gimp: The GNU Image Manipulation Program\r\n\r\nDetails:\r\n\r\nJoseph Sheridan discovered that GIMP incorrectly handled certain malformed\r\nheaders in FIT files. If a user were tricked into opening a specially\r\ncrafted FIT image file, an attacker could cause GIMP to crash.\r\n(CVE-2012-3236)\r\n\r\nMurray McAllister discovered that GIMP incorrectly handled malformed KiSS\r\npalette files. If a user were tricked into opening a specially crafted KiSS\r\npalette file, an attacker could cause GIMP to crash, or possibly execute\r\narbitrary code with the user's privileges. (CVE-2012-3403)\r\n\r\nMatthias Weckbecker discovered that GIMP incorrectly handled malformed GIF\r\nimage files. If a user were tricked into opening a specially crafted GIF\r\nimage file, an attacker could cause GIMP to crash, or possibly execute\r\narbitrary code with the user's privileges. (CVE-2012-3481)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 12.04 LTS:\r\n gimp 2.6.12-1ubuntu1.1\r\n\r\nUbuntu 11.10:\r\n gimp 2.6.11-2ubuntu4.1\r\n\r\nUbuntu 11.04:\r\n gimp 2.6.11-1ubuntu6.3\r\n\r\nUbuntu 10.04 LTS:\r\n gimp 2.6.8-2ubuntu1.5\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-1559-1\r\n CVE-2012-3236, CVE-2012-3403, CVE-2012-3481\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/gimp/2.6.12-1ubuntu1.1\r\n https://launchpad.net/ubuntu/+source/gimp/2.6.11-2ubuntu4.1\r\n https://launchpad.net/ubuntu/+source/gimp/2.6.11-1ubuntu6.3\r\n https://launchpad.net/ubuntu/+source/gimp/2.6.8-2ubuntu1.5\r\n\r\n\r\n\r\n\r\n-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n", "edition": 1, "modified": "2012-09-19T00:00:00", "published": "2012-09-19T00:00:00", "id": "SECURITYVULNS:DOC:28572", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28572", "title": "[USN-1559-1] GIMP vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:48", "bulletinFamily": "software", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236"], "description": "Memory corruption on FIT, GIF, KiSS images parsing.", "edition": 1, "modified": "2012-09-19T00:00:00", "published": "2012-09-19T00:00:00", "id": "SECURITYVULNS:VULN:12593", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12593", "title": "gimp multiple security vulnereabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:48", "bulletinFamily": "software", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "Memory corruptions on KISS CEL and GIF parsing.", "edition": 1, "modified": "2012-08-27T00:00:00", "published": "2012-08-27T00:00:00", "id": "SECURITYVULNS:VULN:12539", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12539", "title": "GIMP security vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:45", "bulletinFamily": "software", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2012:142\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : gimp\r\n Date : August 21, 2012\r\n Affected: 2011., Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been discovered and corrected in gimp:\r\n \r\n A heap-based buffer overflow flaw, leading to invalid free, was\r\n found in the way KISS CEL file format plug-in of Gimp, the GNU Image\r\n Manipulation Program, performed loading of certain palette files. A\r\n remote attacker could provide a specially-crafted KISS palette file\r\n that, when opened in Gimp would cause the CEL plug-in to crash or,\r\n potentially, execute arbitrary code with the privileges of the user\r\n running the gimp executable (CVE-2012-3403).\r\n \r\n Integer overflow, leading to heap-based buffer overflow flaw was\r\n found in the GIMP's GIF (Graphics Interchange Format) image file\r\n plug-in. An attacker could create a specially-crafted GIF image\r\n file that, when opened, could cause the GIF plug-in to crash or,\r\n potentially, execute arbitrary code with the privileges of the user\r\n running the GIMP (CVE-2012-3481).\r\n \r\n The updated gimp packages have been upgraded to the 2.6.12 version\r\n and patched to correct these issues.\r\n \r\n Additionally for Mandriva Enterprise server 5 the gegl packages\r\n was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9,\r\n the enscript packages was added because of a build dependency, the\r\n gutenprint and mtink packages was rebuilt against the gimp 2.6.12\r\n libraries.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3403\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2011:\r\n 6df85e0bd146aad5111cb93b13aa3d3c 2011/i586/gimp-2.6.12-0.1-mdv2011.0.i586.rpm\r\n c33ee12112d91e840acff735814c2332 2011/i586/gimp-python-2.6.12-0.1-mdv2011.0.i586.rpm\r\n b3cee341cd0391530f2234e25c3f3829 2011/i586/libgimp2.0_0-2.6.12-0.1-mdv2011.0.i586.rpm\r\n b9ae9ef5a24742e1230ef2b21cdaf9fe 2011/i586/libgimp2.0-devel-2.6.12-0.1-mdv2011.0.i586.rpm \r\n 1b6b4193b5d548d4e15715266bf47560 2011/SRPMS/gimp-2.6.12-0.1.src.rpm\r\n\r\n Mandriva Linux 2011/X86_64:\r\n 9f683f9345ffead8bdb51be9db90146e 2011/x86_64/gimp-2.6.12-0.1-mdv2011.0.x86_64.rpm\r\n a8de76aab2e7ce6338fd9f967b998e9c 2011/x86_64/gimp-python-2.6.12-0.1-mdv2011.0.x86_64.rpm\r\n 52543a7c6db50902d3ca73b10075ffb7 2011/x86_64/lib64gimp2.0_0-2.6.12-0.1-mdv2011.0.x86_64.rpm\r\n 6ca3008f8cb920bfa3bae50d6fd6a232 2011/x86_64/lib64gimp2.0-devel-2.6.12-0.1-mdv2011.0.x86_64.rpm \r\n 1b6b4193b5d548d4e15715266bf47560 2011/SRPMS/gimp-2.6.12-0.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n adfd583395e293e65eb9bdc01411b66a mes5/i586/enscript-1.6.4-8.2mdvmes5.2.i586.rpm\r\n d66cc2ba6f8243e00eb066d1c3358145 mes5/i586/gegl-0.0.22-0.1mdvmes5.2.i586.rpm\r\n d890ec13a8981fe618bf6ba7f6a662e5 mes5/i586/gimp-2.6.12-0.1mdvmes5.2.i586.rpm\r\n d89b715a1b588006d8876c18da78d3c4 mes5/i586/gimp-python-2.6.12-0.1mdvmes5.2.i586.rpm\r\n 4238c650ca3f88169008c15813fffc97 mes5/i586/gutenprint-common-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 90cf02d5e29adb704ab063d50c0c6ec2 mes5/i586/gutenprint-cups-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 7e1bdf5b099770184c5206a5ea1a4169 mes5/i586/gutenprint-escputil-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 91c4d10340291be5af1d161d75510bdb mes5/i586/gutenprint-foomatic-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 20fcd1e4e30c918b3fae7b9bf894e983 mes5/i586/gutenprint-gimp2-5.2.3-0.3mdvmes5.2.i586.rpm\r\n bc7aebfd12c6810a6dbf78e555ae27c9 mes5/i586/gutenprint-ijs-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 95bb0625b0bb3cb309566cf7feffc5ed mes5/i586/libgegl0-0.0.22-0.1mdvmes5.2.i586.rpm\r\n eac4476ae3c38d6779fe70c30661e132 mes5/i586/libgegl-devel-0.0.22-0.1mdvmes5.2.i586.rpm\r\n d31b196dd6a62bf611285bef72f8b8ed mes5/i586/libgimp2.0_0-2.6.12-0.1mdvmes5.2.i586.rpm\r\n 016ae0eaa31501c90bb91d7e47cc807b mes5/i586/libgimp2.0-devel-2.6.12-0.1mdvmes5.2.i586.rpm\r\n 453bb3526f6fcf2a8538d08564b8a904 mes5/i586/libgutenprint2-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 326394d81a3eabf6d41d296a6b7b8d58 mes5/i586/libgutenprint2-devel-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 114e245beba24c9f7ff3d024853950e9 mes5/i586/libgutenprintui2_1-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 4a273b1c580b0e23c1f47cf62f3e0535 mes5/i586/libgutenprintui2_1-devel-5.2.3-0.3mdvmes5.2.i586.rpm\r\n 5c38d85ad6d379de351906089caa9881 mes5/i586/mtink-1.0.14-14.2mdvmes5.2.i586.rpm \r\n a993266194594b6b7951c05ed4790d9d mes5/SRPMS/enscript-1.6.4-8.2mdvmes5.2.src.rpm\r\n 9078b3e6d4fdd8755b533599c91ad1c0 mes5/SRPMS/gegl-0.0.22-0.1mdvmes5.2.src.rpm\r\n adaa780385959b892bc7cc2c1a3e6f7f mes5/SRPMS/gimp-2.6.12-0.1mdvmes5.2.src.rpm\r\n 324a98ab9ac0c772bd8c52b57ea14a2d mes5/SRPMS/gutenprint-5.2.3-0.3mdvmes5.2.src.rpm\r\n 97b94cadb79f40ac930f71443e0b9e29 mes5/SRPMS/mtink-1.0.14-14.2mdvmes5.2.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n ce1f98f921ac74975d6b609032fbb9eb mes5/x86_64/enscript-1.6.4-8.2mdvmes5.2.x86_64.rpm\r\n 7bb75619775c9fcb79969301d9b83646 mes5/x86_64/gegl-0.0.22-0.1mdvmes5.2.x86_64.rpm\r\n bc79556d1d5abc375652b40ce711ac04 mes5/x86_64/gimp-2.6.12-0.1mdvmes5.2.x86_64.rpm\r\n 0bca1d205b8f692896fa6e68340a4444 mes5/x86_64/gimp-python-2.6.12-0.1mdvmes5.2.x86_64.rpm\r\n 1264a7e67c082297d69d04dd43895cd8 mes5/x86_64/gutenprint-common-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 53bda658df6540665264ecc1ed9ff6da mes5/x86_64/gutenprint-cups-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 295ac9156ffee42a512713b6aec8da36 mes5/x86_64/gutenprint-escputil-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 633e8ab8d476e440d64baa4b47012563 mes5/x86_64/gutenprint-foomatic-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n d405f95ade321b610f1c44bbf805f5b1 mes5/x86_64/gutenprint-gimp2-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 8d2ccdf35f159b69c44fd84c5f5c00b1 mes5/x86_64/gutenprint-ijs-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 6f8164ef693858736f2aec38f31cb9c8 mes5/x86_64/lib64gegl0-0.0.22-0.1mdvmes5.2.x86_64.rpm\r\n 01f465095a4f2a0e8533008d45dbc08d mes5/x86_64/lib64gegl-devel-0.0.22-0.1mdvmes5.2.x86_64.rpm\r\n 72e57d27a953c8e09fc9748cb18f9a86 mes5/x86_64/lib64gimp2.0_0-2.6.12-0.1mdvmes5.2.x86_64.rpm\r\n 88bfb7f493111df29efa7e1b22ca72fb mes5/x86_64/lib64gimp2.0-devel-2.6.12-0.1mdvmes5.2.x86_64.rpm\r\n 07d38077acd65da67c9ebb95b828a20b mes5/x86_64/lib64gutenprint2-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n bfb316021e3c3896ef6c3daab6684008 mes5/x86_64/lib64gutenprint2-devel-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 55a465cb018c4dc97ede038dabc3d1ff mes5/x86_64/lib64gutenprintui2_1-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n e2217d76b94bb47e952957bcffbd3227 mes5/x86_64/lib64gutenprintui2_1-devel-5.2.3-0.3mdvmes5.2.x86_64.rpm\r\n 420aff1280ab464d40aea0b5b75d44af mes5/x86_64/mtink-1.0.14-14.2mdvmes5.2.x86_64.rpm \r\n a993266194594b6b7951c05ed4790d9d mes5/SRPMS/enscript-1.6.4-8.2mdvmes5.2.src.rpm\r\n 9078b3e6d4fdd8755b533599c91ad1c0 mes5/SRPMS/gegl-0.0.22-0.1mdvmes5.2.src.rpm\r\n adaa780385959b892bc7cc2c1a3e6f7f mes5/SRPMS/gimp-2.6.12-0.1mdvmes5.2.src.rpm\r\n 324a98ab9ac0c772bd8c52b57ea14a2d mes5/SRPMS/gutenprint-5.2.3-0.3mdvmes5.2.src.rpm\r\n 97b94cadb79f40ac930f71443e0b9e29 mes5/SRPMS/mtink-1.0.14-14.2mdvmes5.2.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.11 (GNU/Linux)\r\n\r\niD8DBQFQM4KJmqjQ0CJFipgRAib9AJ99hkTs6tnjVSPs4vhVan9JoFakZQCeJgZu\r\nEYy4NCsp0eQx4uP2I2zoQ/4=\r\n=1VeY\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2012-08-27T00:00:00", "published": "2012-08-27T00:00:00", "id": "SECURITYVULNS:DOC:28425", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28425", "title": "[ MDVSA-2012:142 ] gimp", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-12-04T11:21:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1559-1", "modified": "2017-12-01T00:00:00", "published": "2012-09-11T00:00:00", "id": "OPENVAS:841141", "href": "http://plugins.openvas.org/nasl.php?oid=841141", "type": "openvas", "title": "Ubuntu Update for gimp USN-1559-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1559_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for gimp USN-1559-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Joseph Sheridan discovered that GIMP incorrectly handled certain malformed\n headers in FIT files. If a user were tricked into opening a specially\n crafted FIT image file, an attacker could cause GIMP to crash.\n (CVE-2012-3236)\n\n Murray McAllister discovered that GIMP incorrectly handled malformed KiSS\n palette files. If a user were tricked into opening a specially crafted KiSS\n palette file, an attacker could cause GIMP to crash, or possibly execute\n arbitrary code with the user's privileges. (CVE-2012-3403)\n \n Matthias Weckbecker discovered that GIMP incorrectly handled malformed GIF\n image files. If a user were tricked into opening a specially crafted GIF\n image file, an attacker could cause GIMP to crash, or possibly execute\n arbitrary code with the user's privileges. (CVE-2012-3481)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1559-1\";\ntag_affected = \"gimp on Ubuntu 12.04 LTS ,\n Ubuntu 11.10 ,\n Ubuntu 11.04 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1559-1/\");\n script_id(841141);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-11 09:38:35 +0530 (Tue, 11 Sep 2012)\");\n script_cve_id(\"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"1559-1\");\n script_name(\"Ubuntu Update for gimp USN-1559-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.8-2ubuntu1.5\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.12-1ubuntu1.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.11-2ubuntu4.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.11-1ubuntu6.3\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1559-1", "modified": "2019-03-13T00:00:00", "published": "2012-09-11T00:00:00", "id": "OPENVAS:1361412562310841141", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841141", "type": "openvas", "title": "Ubuntu Update for gimp USN-1559-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1559_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for gimp USN-1559-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1559-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841141\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-11 09:38:35 +0530 (Tue, 11 Sep 2012)\");\n script_cve_id(\"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"USN\", value:\"1559-1\");\n script_name(\"Ubuntu Update for gimp USN-1559-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(10\\.04 LTS|12\\.04 LTS|11\\.10|11\\.04)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1559-1\");\n script_tag(name:\"affected\", value:\"gimp on Ubuntu 12.04 LTS,\n Ubuntu 11.10,\n Ubuntu 11.04,\n Ubuntu 10.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Joseph Sheridan discovered that GIMP incorrectly handled certain malformed\n headers in FIT files. If a user were tricked into opening a specially\n crafted FIT image file, an attacker could cause GIMP to crash.\n (CVE-2012-3236)\n\n Murray McAllister discovered that GIMP incorrectly handled malformed KiSS\n palette files. If a user were tricked into opening a specially crafted KiSS\n palette file, an attacker could cause GIMP to crash, or possibly execute\n arbitrary code with the user's privileges. (CVE-2012-3403)\n\n Matthias Weckbecker discovered that GIMP incorrectly handled malformed GIF\n image files. If a user were tricked into opening a specially crafted GIF\n image file, an attacker could cause GIMP to crash, or possibly execute\n arbitrary code with the user's privileges. (CVE-2012-3481)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.8-2ubuntu1.5\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.12-1ubuntu1.1\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.11-2ubuntu4.1\", rls:\"UBUNTU11.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gimp\", ver:\"2.6.11-1ubuntu6.3\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-02T10:57:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236", "CVE-2012-2763"], "description": "Check for the Version of gimp", "modified": "2018-01-02T00:00:00", "published": "2012-12-13T00:00:00", "id": "OPENVAS:850318", "href": "http://plugins.openvas.org/nasl.php?oid=850318", "type": "openvas", "title": "SuSE Update for gimp openSUSE-SU-2012:1080-1 (gimp)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2012_1080_1.nasl 8267 2018-01-02 06:29:17Z teissa $\n#\n# SuSE Update for gimp openSUSE-SU-2012:1080-1 (gimp)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"gimp on openSUSE 12.1, openSUSE 11.4\";\ntag_insight = \"Multiple integer overflows in various decoder plug-ins of\n GIMP have been fixed.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850318);\n script_version(\"$Revision: 8267 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 07:29:17 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-13 17:01:41 +0530 (Thu, 13 Dec 2012)\");\n script_cve_id(\"CVE-2012-2763\", \"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"openSUSE-SU\", value: \"2012:1080_1\");\n script_name(\"SuSE Update for gimp openSUSE-SU-2012:1080-1 (gimp)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of gimp\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE11.4\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-branding-upstream\", rpm:\"gimp-branding-upstream~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-debuginfo\", rpm:\"gimp-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-debugsource\", rpm:\"gimp-debugsource~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-devel\", rpm:\"gimp-devel~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-devel-debuginfo\", rpm:\"gimp-devel-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-help-browser\", rpm:\"gimp-help-browser~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-help-browser-debuginfo\", rpm:\"gimp-help-browser-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-module-hal\", rpm:\"gimp-module-hal~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-module-hal-debuginfo\", rpm:\"gimp-module-hal-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-plugins-python\", rpm:\"gimp-plugins-python~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-plugins-python-debuginfo\", rpm:\"gimp-plugins-python-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0\", rpm:\"libgimp-2_0-0~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo\", rpm:\"libgimp-2_0-0-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0\", rpm:\"libgimpui-2_0-0~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo\", rpm:\"libgimpui-2_0-0-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-32bit\", rpm:\"libgimp-2_0-0-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-32bit\", rpm:\"libgimp-2_0-0-debuginfo-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-32bit\", rpm:\"libgimpui-2_0-0-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-32bit\", rpm:\"libgimpui-2_0-0-debuginfo-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-lang\", rpm:\"gimp-lang~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-x86\", rpm:\"libgimp-2_0-0-debuginfo-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-x86\", rpm:\"libgimp-2_0-0-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-x86\", rpm:\"libgimpui-2_0-0-debuginfo-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-x86\", rpm:\"libgimpui-2_0-0-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"openSUSE12.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-debuginfo\", rpm:\"gimp-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-debugsource\", rpm:\"gimp-debugsource~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-devel\", rpm:\"gimp-devel~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-devel-debuginfo\", rpm:\"gimp-devel-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-help-browser\", rpm:\"gimp-help-browser~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-help-browser-debuginfo\", rpm:\"gimp-help-browser-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-plugins-python\", rpm:\"gimp-plugins-python~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-plugins-python-debuginfo\", rpm:\"gimp-plugins-python-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0\", rpm:\"libgimp-2_0-0~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo\", rpm:\"libgimp-2_0-0-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0\", rpm:\"libgimpui-2_0-0~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo\", rpm:\"libgimpui-2_0-0-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-32bit\", rpm:\"libgimp-2_0-0-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-32bit\", rpm:\"libgimp-2_0-0-debuginfo-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-32bit\", rpm:\"libgimpui-2_0-0-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-32bit\", rpm:\"libgimpui-2_0-0-debuginfo-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-branding-upstream\", rpm:\"gimp-branding-upstream~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-lang\", rpm:\"gimp-lang~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-x86\", rpm:\"libgimp-2_0-0-debuginfo-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp-2_0-0-x86\", rpm:\"libgimp-2_0-0-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-x86\", rpm:\"libgimpui-2_0-0-debuginfo-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimpui-2_0-0-x86\", rpm:\"libgimpui-2_0-0-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-01-31T18:41:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236", "CVE-2012-2763"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2012-12-13T00:00:00", "id": "OPENVAS:1361412562310850318", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850318", "type": "openvas", "title": "openSUSE: Security Advisory for gimp (openSUSE-SU-2012:1080-1)", "sourceData": "# Copyright (C) 2012 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850318\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-12-13 17:01:41 +0530 (Thu, 13 Dec 2012)\");\n script_cve_id(\"CVE-2012-2763\", \"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"openSUSE-SU\", value:\"2012:1080-1\");\n script_name(\"openSUSE: Security Advisory for gimp (openSUSE-SU-2012:1080-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gimp'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=(openSUSE11\\.4|openSUSE12\\.1)\");\n\n script_tag(name:\"affected\", value:\"gimp on openSUSE 12.1, openSUSE 11.4\");\n\n script_tag(name:\"insight\", value:\"Multiple integer overflows in various decoder plug-ins of\n GIMP have been fixed.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE11.4\") {\n if(!isnull(res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-branding-upstream\", rpm:\"gimp-branding-upstream~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-debuginfo\", rpm:\"gimp-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-debugsource\", rpm:\"gimp-debugsource~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-devel\", rpm:\"gimp-devel~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-devel-debuginfo\", rpm:\"gimp-devel-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-help-browser\", rpm:\"gimp-help-browser~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-help-browser-debuginfo\", rpm:\"gimp-help-browser-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-module-hal\", rpm:\"gimp-module-hal~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-module-hal-debuginfo\", rpm:\"gimp-module-hal-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-plugins-python\", rpm:\"gimp-plugins-python~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-plugins-python-debuginfo\", rpm:\"gimp-plugins-python-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0\", rpm:\"libgimp-2_0-0~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo\", rpm:\"libgimp-2_0-0-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0\", rpm:\"libgimpui-2_0-0~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo\", rpm:\"libgimpui-2_0-0-debuginfo~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-32bit\", rpm:\"libgimp-2_0-0-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-32bit\", rpm:\"libgimp-2_0-0-debuginfo-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-32bit\", rpm:\"libgimpui-2_0-0-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-32bit\", rpm:\"libgimpui-2_0-0-debuginfo-32bit~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-lang\", rpm:\"gimp-lang~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-x86\", rpm:\"libgimp-2_0-0-debuginfo-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-x86\", rpm:\"libgimp-2_0-0-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-x86\", rpm:\"libgimpui-2_0-0-debuginfo-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-x86\", rpm:\"libgimpui-2_0-0-x86~2.6.11~13.58.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"openSUSE12.1\") {\n if(!isnull(res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-debuginfo\", rpm:\"gimp-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-debugsource\", rpm:\"gimp-debugsource~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-devel\", rpm:\"gimp-devel~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-devel-debuginfo\", rpm:\"gimp-devel-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-help-browser\", rpm:\"gimp-help-browser~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-help-browser-debuginfo\", rpm:\"gimp-help-browser-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-plugins-python\", rpm:\"gimp-plugins-python~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-plugins-python-debuginfo\", rpm:\"gimp-plugins-python-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0\", rpm:\"libgimp-2_0-0~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo\", rpm:\"libgimp-2_0-0-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0\", rpm:\"libgimpui-2_0-0~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo\", rpm:\"libgimpui-2_0-0-debuginfo~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-32bit\", rpm:\"libgimp-2_0-0-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-32bit\", rpm:\"libgimp-2_0-0-debuginfo-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-32bit\", rpm:\"libgimpui-2_0-0-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-32bit\", rpm:\"libgimpui-2_0-0-debuginfo-32bit~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-branding-upstream\", rpm:\"gimp-branding-upstream~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gimp-lang\", rpm:\"gimp-lang~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-debuginfo-x86\", rpm:\"libgimp-2_0-0-debuginfo-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimp-2_0-0-x86\", rpm:\"libgimp-2_0-0-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-debuginfo-x86\", rpm:\"libgimpui-2_0-0-debuginfo-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgimpui-2_0-0-x86\", rpm:\"libgimpui-2_0-0-x86~2.6.11~28.26.1\", rls:\"openSUSE12.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-06T13:07:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "Check for the Version of gimp", "modified": "2018-01-04T00:00:00", "published": "2012-08-30T00:00:00", "id": "OPENVAS:864675", "href": "http://plugins.openvas.org/nasl.php?oid=864675", "type": "openvas", "title": "Fedora Update for gimp FEDORA-2012-12383", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for gimp FEDORA-2012-12383\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"gimp on Fedora 17\";\ntag_insight = \"GIMP (GNU Image Manipulation Program) is a powerful image composition and\n editing program, which can be extremely useful for creating logos and other\n graphics for webpages. GIMP has many of the tools and filters you would expect\n to find in similar commercial offerings, and some interesting extras as well.\n GIMP provides a large image manipulation toolbox, including channel operations\n and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all\n with multi-level undo.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085728.html\");\n script_id(864675);\n script_version(\"$Revision: 8285 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 07:29:16 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:35:12 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-12383\");\n script_name(\"Fedora Update for gimp FEDORA-2012-12383\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of gimp\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.8.2~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-04T00:00:00", "id": "OPENVAS:1361412562310864688", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864688", "type": "openvas", "title": "Fedora Update for gimp FEDORA-2012-12364", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for gimp FEDORA-2012-12364\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/085888.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864688\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-04 11:34:43 +0530 (Tue, 04 Sep 2012)\");\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-12364\");\n script_name(\"Fedora Update for gimp FEDORA-2012-12364\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gimp'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"gimp on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.12~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:38:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-08-30T00:00:00", "id": "OPENVAS:1361412562310864675", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864675", "type": "openvas", "title": "Fedora Update for gimp FEDORA-2012-12383", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for gimp FEDORA-2012-12383\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085728.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864675\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-30 10:35:12 +0530 (Thu, 30 Aug 2012)\");\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-12383\");\n script_name(\"Fedora Update for gimp FEDORA-2012-12383\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gimp'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"gimp on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.8.2~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-06T13:07:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "Check for the Version of gimp", "modified": "2018-01-05T00:00:00", "published": "2012-09-04T00:00:00", "id": "OPENVAS:864688", "href": "http://plugins.openvas.org/nasl.php?oid=864688", "type": "openvas", "title": "Fedora Update for gimp FEDORA-2012-12364", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for gimp FEDORA-2012-12364\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"gimp on Fedora 16\";\ntag_insight = \"GIMP (GNU Image Manipulation Program) is a powerful image composition and\n editing program, which can be extremely useful for creating logos and other\n graphics for webpages. GIMP has many of the tools and filters you would expect\n to find in similar commercial offerings, and some interesting extras as well.\n GIMP provides a large image manipulation toolbox, including channel operations\n and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all\n with multi-level undo.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/085888.html\");\n script_id(864688);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-04 11:34:43 +0530 (Tue, 04 Sep 2012)\");\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-12364\");\n script_name(\"Fedora Update for gimp FEDORA-2012-12364\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of gimp\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.12~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "The remote host is missing an update for the ", "modified": "2019-03-12T00:00:00", "published": "2012-08-24T00:00:00", "id": "OPENVAS:1361412562310831726", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831726", "type": "openvas", "title": "Mandriva Update for gimp MDVSA-2012:142 (gimp)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for gimp MDVSA-2012:142 (gimp)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:142\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831726\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-24 09:57:21 +0530 (Fri, 24 Aug 2012)\");\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"MDVSA\", value:\"2012:142\");\n script_name(\"Mandriva Update for gimp MDVSA-2012:142 (gimp)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gimp'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_(2011\\.0|mes5\\.2)\");\n script_tag(name:\"affected\", value:\"gimp on Mandriva Linux 2011.0,\n Mandriva Enterprise Server 5.2\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities has been discovered and corrected in gimp:\n\n A heap-based buffer overflow flaw, leading to invalid free, was\n found in the way KISS CEL file format plug-in of Gimp, the GNU Image\n Manipulation Program, performed loading of certain palette files. A\n remote attacker could provide a specially-crafted KISS palette file\n that, when opened in Gimp would cause the CEL plug-in to crash or,\n potentially, execute arbitrary code with the privileges of the user\n running the gimp executable (CVE-2012-3403).\n\n Integer overflow, leading to heap-based buffer overflow flaw was\n found in the GIMP's GIF (Graphics Interchange Format) image file\n plug-in. An attacker could create a specially-crafted GIF image\n file that, when opened, could cause the GIF plug-in to crash or,\n potentially, execute arbitrary code with the privileges of the user\n running the GIMP (CVE-2012-3481).\n\n The updated gimp packages have been upgraded to the 2.6.12 version\n and patched to correct these issues.\n\n Additionally for Mandriva Enterprise server 5 the gegl packages\n was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9,\n the enscript packages was added because of a build dependency, the\n gutenprint and mtink packages was rebuilt against the gimp 2.6.12\n libraries.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-python\", rpm:\"gimp-python~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0_0\", rpm:\"libgimp2.0_0~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0-devel\", rpm:\"libgimp2.0-devel~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0_0\", rpm:\"lib64gimp2.0_0~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0-devel\", rpm:\"lib64gimp2.0-devel~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_mes5.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"enscript\", rpm:\"enscript~1.6.4~8.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gegl\", rpm:\"gegl~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-python\", rpm:\"gimp-python~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-common\", rpm:\"gutenprint-common~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-cups\", rpm:\"gutenprint-cups~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-escputil\", rpm:\"gutenprint-escputil~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-foomatic\", rpm:\"gutenprint-foomatic~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-gimp2\", rpm:\"gutenprint-gimp2~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-ijs\", rpm:\"gutenprint-ijs~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgegl0\", rpm:\"libgegl0~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgegl-devel\", rpm:\"libgegl-devel~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0_0\", rpm:\"libgimp2.0_0~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0-devel\", rpm:\"libgimp2.0-devel~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprint2\", rpm:\"libgutenprint2~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprint2-devel\", rpm:\"libgutenprint2-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprintui2_1\", rpm:\"libgutenprintui2_1~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprintui2_1-devel\", rpm:\"libgutenprintui2_1-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mtink\", rpm:\"mtink~1.0.14~14.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint\", rpm:\"gutenprint~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gegl0\", rpm:\"lib64gegl0~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gegl-devel\", rpm:\"lib64gegl-devel~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0_0\", rpm:\"lib64gimp2.0_0~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0-devel\", rpm:\"lib64gimp2.0-devel~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprint2\", rpm:\"lib64gutenprint2~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprint2-devel\", rpm:\"lib64gutenprint2-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprintui2_1\", rpm:\"lib64gutenprintui2_1~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprintui2_1-devel\", rpm:\"lib64gutenprintui2_1-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-11T11:05:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "Check for the Version of gimp", "modified": "2018-01-10T00:00:00", "published": "2012-08-24T00:00:00", "id": "OPENVAS:831726", "href": "http://plugins.openvas.org/nasl.php?oid=831726", "type": "openvas", "title": "Mandriva Update for gimp MDVSA-2012:142 (gimp)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for gimp MDVSA-2012:142 (gimp)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been discovered and corrected in gimp:\n\n A heap-based buffer overflow flaw, leading to invalid free, was\n found in the way KISS CEL file format plug-in of Gimp, the GNU Image\n Manipulation Program, performed loading of certain palette files. A\n remote attacker could provide a specially-crafted KISS palette file\n that, when opened in Gimp would cause the CEL plug-in to crash or,\n potentially, execute arbitrary code with the privileges of the user\n running the gimp executable (CVE-2012-3403).\n\n Integer overflow, leading to heap-based buffer overflow flaw was\n found in the GIMP's GIF (Graphics Interchange Format) image file\n plug-in. An attacker could create a specially-crafted GIF image\n file that, when opened, could cause the GIF plug-in to crash or,\n potentially, execute arbitrary code with the privileges of the user\n running the GIMP (CVE-2012-3481).\n\n The updated gimp packages have been upgraded to the 2.6.12 version\n and patched to correct these issues.\n\n Additionally for Mandriva Enterprise server 5 the gegl packages\n was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9,\n the enscript packages was added because of a build dependency, the\n gutenprint and mtink packages was rebuilt against the gimp 2.6.12\n libraries.\";\n\ntag_affected = \"gimp on Mandriva Linux 2011.0,\n Mandriva Enterprise Server 5.2\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:142\");\n script_id(831726);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-24 09:57:21 +0530 (Fri, 24 Aug 2012)\");\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2012:142\");\n script_name(\"Mandriva Update for gimp MDVSA-2012:142 (gimp)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of gimp\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-python\", rpm:\"gimp-python~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0_0\", rpm:\"libgimp2.0_0~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0-devel\", rpm:\"libgimp2.0-devel~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0_0\", rpm:\"lib64gimp2.0_0~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0-devel\", rpm:\"lib64gimp2.0-devel~2.6.12~0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_mes5.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"enscript\", rpm:\"enscript~1.6.4~8.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gegl\", rpm:\"gegl~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp\", rpm:\"gimp~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gimp-python\", rpm:\"gimp-python~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-common\", rpm:\"gutenprint-common~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-cups\", rpm:\"gutenprint-cups~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-escputil\", rpm:\"gutenprint-escputil~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-foomatic\", rpm:\"gutenprint-foomatic~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-gimp2\", rpm:\"gutenprint-gimp2~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint-ijs\", rpm:\"gutenprint-ijs~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgegl0\", rpm:\"libgegl0~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgegl-devel\", rpm:\"libgegl-devel~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0_0\", rpm:\"libgimp2.0_0~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgimp2.0-devel\", rpm:\"libgimp2.0-devel~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprint2\", rpm:\"libgutenprint2~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprint2-devel\", rpm:\"libgutenprint2-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprintui2_1\", rpm:\"libgutenprintui2_1~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libgutenprintui2_1-devel\", rpm:\"libgutenprintui2_1-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"mtink\", rpm:\"mtink~1.0.14~14.2mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"gutenprint\", rpm:\"gutenprint~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gegl0\", rpm:\"lib64gegl0~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gegl-devel\", rpm:\"lib64gegl-devel~0.0.22~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0_0\", rpm:\"lib64gimp2.0_0~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gimp2.0-devel\", rpm:\"lib64gimp2.0-devel~2.6.12~0.1mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprint2\", rpm:\"lib64gutenprint2~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprint2-devel\", rpm:\"lib64gutenprint2-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprintui2_1\", rpm:\"lib64gutenprintui2_1~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64gutenprintui2_1-devel\", rpm:\"lib64gutenprintui2_1-devel~5.2.3~0.3mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-03-01T07:24:39", "description": "Joseph Sheridan discovered that GIMP incorrectly handled certain\nmalformed headers in FIT files. If a user were tricked into opening a\nspecially crafted FIT image file, an attacker could cause GIMP to\ncrash. (CVE-2012-3236)\n\nMurray McAllister discovered that GIMP incorrectly handled malformed\nKiSS palette files. If a user were tricked into opening a specially\ncrafted KiSS palette file, an attacker could cause GIMP to crash, or\npossibly execute arbitrary code with the user's privileges.\n(CVE-2012-3403)\n\nMatthias Weckbecker discovered that GIMP incorrectly handled malformed\nGIF image files. If a user were tricked into opening a specially\ncrafted GIF image file, an attacker could cause GIMP to crash, or\npossibly execute arbitrary code with the user's privileges.\n(CVE-2012-3481).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2012-09-11T00:00:00", "title": "Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : gimp vulnerabilities (USN-1559-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:gimp", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:11.04", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1559-1.NASL", "href": "https://www.tenable.com/plugins/nessus/62037", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1559-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62037);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n script_bugtraq_id(54246, 55101);\n script_xref(name:\"USN\", value:\"1559-1\");\n\n script_name(english:\"Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : gimp vulnerabilities (USN-1559-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Joseph Sheridan discovered that GIMP incorrectly handled certain\nmalformed headers in FIT files. If a user were tricked into opening a\nspecially crafted FIT image file, an attacker could cause GIMP to\ncrash. (CVE-2012-3236)\n\nMurray McAllister discovered that GIMP incorrectly handled malformed\nKiSS palette files. If a user were tricked into opening a specially\ncrafted KiSS palette file, an attacker could cause GIMP to crash, or\npossibly execute arbitrary code with the user's privileges.\n(CVE-2012-3403)\n\nMatthias Weckbecker discovered that GIMP incorrectly handled malformed\nGIF image files. If a user were tricked into opening a specially\ncrafted GIF image file, an attacker could cause GIMP to crash, or\npossibly execute arbitrary code with the user's privileges.\n(CVE-2012-3481).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1559-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gimp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/07/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(10\\.04|11\\.04|11\\.10|12\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 10.04 / 11.04 / 11.10 / 12.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"10.04\", pkgname:\"gimp\", pkgver:\"2.6.8-2ubuntu1.5\")) flag++;\nif (ubuntu_check(osver:\"11.04\", pkgname:\"gimp\", pkgver:\"2.6.11-1ubuntu6.3\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"gimp\", pkgver:\"2.6.11-2ubuntu4.1\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"gimp\", pkgver:\"2.6.12-1ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:54:06", "description": "Updated gimp packages fix security vulnerabilities :\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create\na specially crafted GIF image file that, when opened, could cause the\nGIF plug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP (CVE-2012-3481).\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL\nfile format plug-in. An attacker could create a specially crafted KiSS\npalette file that, when opened, could cause the CEL plug-in to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running the GIMP (CVE-2012-3403).\n\nfits-io.c in GIMP before 2.8.1 allows remote attackers to cause a\ndenial of service (NULL pointer dereference and application crash) via\na malformed XTENSION header of a .fit file, as demonstrated using a\nlong string. (CVE-2012-3236)\n\nGIMP 2.8.2 and earlier is vulnerable to memory corruption when reading\nXWD files, which could lead even to arbitrary code execution\n(CVE-2012-5576).\n\nAdditionally it fixes partial translations in several languages.\n\nThis gimp update provides the stable maintenance release 2.8.2 which\nfixes the above security issues.", "edition": 25, "published": "2013-04-20T00:00:00", "title": "Mandriva Linux Security Advisory : gimp (MDVSA-2013:082)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-5576", "CVE-2012-3236"], "modified": "2013-04-20T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:gimp-python", "p-cpe:/a:mandriva:linux:lib64gimp2.0_0", "p-cpe:/a:mandriva:linux:gimp", "p-cpe:/a:mandriva:linux:lib64gimp2.0-devel"], "id": "MANDRIVA_MDVSA-2013-082.NASL", "href": "https://www.tenable.com/plugins/nessus/66096", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2013:082. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(66096);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\", \"CVE-2012-5576\");\n script_bugtraq_id(54246, 55101, 56647);\n script_xref(name:\"MDVSA\", value:\"2013:082\");\n script_xref(name:\"MGASA\", value:\"2012-0236\");\n script_xref(name:\"MGASA\", value:\"2012-0286\");\n script_xref(name:\"MGASA\", value:\"2012-0360\");\n\n script_name(english:\"Mandriva Linux Security Advisory : gimp (MDVSA-2013:082)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated gimp packages fix security vulnerabilities :\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create\na specially crafted GIF image file that, when opened, could cause the\nGIF plug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP (CVE-2012-3481).\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL\nfile format plug-in. An attacker could create a specially crafted KiSS\npalette file that, when opened, could cause the CEL plug-in to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running the GIMP (CVE-2012-3403).\n\nfits-io.c in GIMP before 2.8.1 allows remote attackers to cause a\ndenial of service (NULL pointer dereference and application crash) via\na malformed XTENSION header of a .fit file, as demonstrated using a\nlong string. (CVE-2012-3236)\n\nGIMP 2.8.2 and earlier is vulnerable to memory corruption when reading\nXWD files, which could lead even to arbitrary code execution\n(CVE-2012-5576).\n\nAdditionally it fixes partial translations in several languages.\n\nThis gimp update provides the stable maintenance release 2.8.2 which\nfixes the above security issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gimp-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gimp2.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gimp2.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/04/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/04/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"gimp-2.8.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"gimp-python-2.8.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64gimp2.0-devel-2.8.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64gimp2.0_0-2.8.2-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:25:28", "description": "Multiple integer overflows in various decoder plug-ins of GIMP have\nbeen fixed.", "edition": 19, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : gimp (openSUSE-SU-2012:1080-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236", "CVE-2012-2763"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libgimpui-2_0-0-debuginfo", "p-cpe:/a:novell:opensuse:gimp-lang", "p-cpe:/a:novell:opensuse:libgimpui-2_0-0-32bit", "p-cpe:/a:novell:opensuse:gimp-help-browser-debuginfo", "cpe:/o:novell:opensuse:12.1", "p-cpe:/a:novell:opensuse:libgimp-2_0-0-32bit", "p-cpe:/a:novell:opensuse:gimp-debuginfo", "p-cpe:/a:novell:opensuse:libgimp-2_0-0-debuginfo", "p-cpe:/a:novell:opensuse:gimp-debugsource", "p-cpe:/a:novell:opensuse:gimp-plugins-python", "p-cpe:/a:novell:opensuse:libgimp-2_0-0-debuginfo-32bit", "p-cpe:/a:novell:opensuse:gimp", "p-cpe:/a:novell:opensuse:libgimpui-2_0-0-debuginfo-32bit", "p-cpe:/a:novell:opensuse:gimp-devel", "p-cpe:/a:novell:opensuse:gimp-help-browser", "p-cpe:/a:novell:opensuse:gimp-branding-upstream", "p-cpe:/a:novell:opensuse:libgimpui-2_0-0", "p-cpe:/a:novell:opensuse:libgimp-2_0-0", "p-cpe:/a:novell:opensuse:gimp-plugins-python-debuginfo", "p-cpe:/a:novell:opensuse:gimp-devel-debuginfo"], "id": "OPENSUSE-2012-543.NASL", "href": "https://www.tenable.com/plugins/nessus/74735", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2012-543.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74735);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-2763\", \"CVE-2012-3236\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n\n script_name(english:\"openSUSE Security Update : gimp (openSUSE-SU-2012:1080-1)\");\n script_summary(english:\"Check for the openSUSE-2012-543 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple integer overflows in various decoder plug-ins of GIMP have\nbeen fixed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=724628\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=763595\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=769565\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=775433\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2012-09/msg00001.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gimp packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'GIMP script-fu Server Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-help-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-help-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-plugins-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gimp-plugins-python-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimp-2_0-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimp-2_0-0-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimp-2_0-0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimp-2_0-0-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimpui-2_0-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimpui-2_0-0-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimpui-2_0-0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgimpui-2_0-0-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/07/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-branding-upstream-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-debuginfo-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-debugsource-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-devel-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-devel-debuginfo-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-help-browser-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-help-browser-debuginfo-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-lang-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-plugins-python-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"gimp-plugins-python-debuginfo-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"libgimp-2_0-0-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"libgimp-2_0-0-debuginfo-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"libgimpui-2_0-0-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"libgimpui-2_0-0-debuginfo-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"libgimp-2_0-0-32bit-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"libgimp-2_0-0-debuginfo-32bit-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"libgimpui-2_0-0-32bit-2.6.11-28.26.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"libgimpui-2_0-0-debuginfo-32bit-2.6.11-28.26.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:53:50", "description": "Multiple vulnerabilities has been discovered and corrected in gimp :\n\nA heap-based buffer overflow flaw, leading to invalid free, was found\nin the way KISS CEL file format plug-in of Gimp, the GNU Image\nManipulation Program, performed loading of certain palette files. A\nremote attacker could provide a specially crafted KISS palette file\nthat, when opened in Gimp would cause the CEL plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user\nrunning the gimp executable (CVE-2012-3403).\n\nInteger overflow, leading to heap-based buffer overflow flaw was found\nin the GIMP's GIF (Graphics Interchange Format) image file plug-in. An\nattacker could create a specially crafted GIF image file that, when\nopened, could cause the GIF plug-in to crash or, potentially, execute\narbitrary code with the privileges of the user running the GIMP\n(CVE-2012-3481).\n\nThe updated gimp packages have been upgraded to the 2.6.12 version and\npatched to correct these issues.\n\nAdditionally for Mandriva Enterprise server 5 the gegl packages was\nupgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9, the\nenscript packages was added because of a build dependency, the\ngutenprint and mtink packages was rebuilt against the gimp 2.6.12\nlibraries.", "edition": 25, "published": "2012-09-06T00:00:00", "title": "Mandriva Linux Security Advisory : gimp (MDVSA-2012:142)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "modified": "2012-09-06T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2011", "p-cpe:/a:mandriva:linux:gimp-python", "p-cpe:/a:mandriva:linux:lib64gimp2.0_0", "p-cpe:/a:mandriva:linux:gimp", "p-cpe:/a:mandriva:linux:libgimp2.0-devel", "p-cpe:/a:mandriva:linux:libgimp2.0_0", "p-cpe:/a:mandriva:linux:lib64gimp2.0-devel"], "id": "MANDRIVA_MDVSA-2012-142.NASL", "href": "https://www.tenable.com/plugins/nessus/61987", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2012:142. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61987);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_bugtraq_id(55101);\n script_xref(name:\"MDVSA\", value:\"2012:142\");\n\n script_name(english:\"Mandriva Linux Security Advisory : gimp (MDVSA-2012:142)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been discovered and corrected in gimp :\n\nA heap-based buffer overflow flaw, leading to invalid free, was found\nin the way KISS CEL file format plug-in of Gimp, the GNU Image\nManipulation Program, performed loading of certain palette files. A\nremote attacker could provide a specially crafted KISS palette file\nthat, when opened in Gimp would cause the CEL plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user\nrunning the gimp executable (CVE-2012-3403).\n\nInteger overflow, leading to heap-based buffer overflow flaw was found\nin the GIMP's GIF (Graphics Interchange Format) image file plug-in. An\nattacker could create a specially crafted GIF image file that, when\nopened, could cause the GIF plug-in to crash or, potentially, execute\narbitrary code with the privileges of the user running the GIMP\n(CVE-2012-3481).\n\nThe updated gimp packages have been upgraded to the 2.6.12 version and\npatched to correct these issues.\n\nAdditionally for Mandriva Enterprise server 5 the gegl packages was\nupgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9, the\nenscript packages was added because of a build dependency, the\ngutenprint and mtink packages was rebuilt against the gimp 2.6.12\nlibraries.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:gimp-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gimp2.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64gimp2.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libgimp2.0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libgimp2.0_0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2011\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2011\", reference:\"gimp-2.6.12-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"gimp-python-2.6.12-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64gimp2.0-devel-2.6.12-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"x86_64\", reference:\"lib64gimp2.0_0-2.6.12-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libgimp2.0-devel-2.6.12-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", cpu:\"i386\", reference:\"libgimp2.0_0-2.6.12-0.1-mdv2011.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:09:58", "description": "Among other things this update fixes security and stability issues in\nvarious image format loaders. Security issues fixed include\nCVE-2012-3403 and CVE-2012-3481.\n\nOverview of Changes from GIMP 2.8.0 to GIMP 2.8.2\n=================================================\n\nCore :\n\n - Make tag matching always case-insensitive\n\n - Let the tile-cache-size default to half the physical\n memory\n\nGUI :\n\n - Mention that the image was exported in the close warning\n dialog\n\n - Make sure popup windows appear on top on OSX\n\n - Allow file opening by dropping to the OSX dock\n\n - Fix the visibility logic of the export/overwrite menu\n items\n\n - Remove all 'Use GEGL' menu items, they only add bugs\n and zero function\n\n - Improve performance of display filters, especially\n color management\n\n - Fix the image window title to comply with the\n save/export spec and use the same image name\n everywhere, not only in the title\n\n - Fix positioning of pasted/dropped stuff to be more\n reasonable\n\nLibgimp :\n\n - Move gimpdir and thumbnails to proper locations on OSX\n\n - Implement relocation on OSX\n\n - Allow to use $(gimp_installation_dir) in config files\n\nPlug-ins :\n\n - Fix remembering of JPEG load/save defaults\n\n - Revive the page setup dialog on Windows\n\nSource and build system :\n\n - Add Windows installer infrastructure\n\n - Add infrastructure to build GIMP.app on OSX\n\nGeneral :\n\n - Lots of bug fixes\n\n - List of translation updates\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2012-08-29T00:00:00", "title": "Fedora 17 : gimp-2.8.2-1.fc17 (2012-12383)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "modified": "2012-08-29T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:17", "p-cpe:/a:fedoraproject:fedora:gimp"], "id": "FEDORA_2012-12383.NASL", "href": "https://www.tenable.com/plugins/nessus/61703", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-12383.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61703);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_bugtraq_id(55101);\n script_xref(name:\"FEDORA\", value:\"2012-12383\");\n\n script_name(english:\"Fedora 17 : gimp-2.8.2-1.fc17 (2012-12383)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Among other things this update fixes security and stability issues in\nvarious image format loaders. Security issues fixed include\nCVE-2012-3403 and CVE-2012-3481.\n\nOverview of Changes from GIMP 2.8.0 to GIMP 2.8.2\n=================================================\n\nCore :\n\n - Make tag matching always case-insensitive\n\n - Let the tile-cache-size default to half the physical\n memory\n\nGUI :\n\n - Mention that the image was exported in the close warning\n dialog\n\n - Make sure popup windows appear on top on OSX\n\n - Allow file opening by dropping to the OSX dock\n\n - Fix the visibility logic of the export/overwrite menu\n items\n\n - Remove all 'Use GEGL' menu items, they only add bugs\n and zero function\n\n - Improve performance of display filters, especially\n color management\n\n - Fix the image window title to comply with the\n save/export spec and use the same image name\n everywhere, not only in the title\n\n - Fix positioning of pasted/dropped stuff to be more\n reasonable\n\nLibgimp :\n\n - Move gimpdir and thumbnails to proper locations on OSX\n\n - Implement relocation on OSX\n\n - Allow to use $(gimp_installation_dir) in config files\n\nPlug-ins :\n\n - Fix remembering of JPEG load/save defaults\n\n - Revive the page setup dialog on Windows\n\nSource and build system :\n\n - Add Windows installer infrastructure\n\n - Add infrastructure to build GIMP.app on OSX\n\nGeneral :\n\n - Lots of bug fixes\n\n - List of translation updates\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=839020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=847303\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-August/085728.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5dab0380\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gimp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:17\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^17([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 17.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC17\", reference:\"gimp-2.8.2-1.fc17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:00:58", "description": "The remote Solaris system is missing necessary patches to address\nsecurity updates :\n\n - Heap-based buffer overflow in the KiSS CEL file format\n plug-in in GIMP 2.8.x and earlier allows remote\n attackers to cause a denial of service and possibly\n execute arbitrary code via a crafted KiSS palette file,\n which triggers an 'invalid free.' (CVE-2012-3403)\n\n - Integer overflow in the ReadImage function in\n plug-ins/common/file-gif-load.c in the GIF image format\n plug-in in GIMP 2.8.x and earlier allows remote\n attackers to cause a denial of service (application\n crash) and possibly execute arbitrary code via crafted\n height and len properties in a GIF image file, which\n triggers a heap-based buffer overflow. NOTE: some of\n these details are obtained from third party information.\n (CVE-2012-3481)", "edition": 25, "published": "2015-01-19T00:00:00", "title": "Oracle Solaris Third-Party Patch Update : gimp (multiple_vulnerabilities_in_gimp)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "modified": "2015-01-19T00:00:00", "cpe": ["cpe:/o:oracle:solaris:11.1", "p-cpe:/a:oracle:solaris:gimp"], "id": "SOLARIS11_GIMP_20130219.NASL", "href": "https://www.tenable.com/plugins/nessus/80622", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Oracle Third Party software advisories.\n#\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(80622);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n\n script_name(english:\"Oracle Solaris Third-Party Patch Update : gimp (multiple_vulnerabilities_in_gimp)\");\n script_summary(english:\"Check for the 'entire' version.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Solaris system is missing a security patch for third-party\nsoftware.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote Solaris system is missing necessary patches to address\nsecurity updates :\n\n - Heap-based buffer overflow in the KiSS CEL file format\n plug-in in GIMP 2.8.x and earlier allows remote\n attackers to cause a denial of service and possibly\n execute arbitrary code via a crafted KiSS palette file,\n which triggers an 'invalid free.' (CVE-2012-3403)\n\n - Integer overflow in the ReadImage function in\n plug-ins/common/file-gif-load.c in the GIF image format\n plug-in in GIMP 2.8.x and earlier allows remote\n attackers to cause a denial of service (application\n crash) and possibly execute arbitrary code via crafted\n height and len properties in a GIF image file, which\n triggers a heap-based buffer overflow. NOTE: some of\n these details are obtained from third party information.\n (CVE-2012-3481)\"\n );\n # https://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4a913f44\"\n );\n # https://blogs.oracle.com/sunsecurity/multiple-vulnerabilities-in-gimp\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5f5d0ac7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Solaris 11.1.4.5.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:solaris:11.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:solaris:gimp\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/01/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Solaris Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Solaris11/release\", \"Host/Solaris11/pkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"solaris.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Solaris11/release\");\nif (isnull(release)) audit(AUDIT_OS_NOT, \"Solaris11\");\npkg_list = solaris_pkg_list_leaves();\nif (isnull (pkg_list)) audit(AUDIT_PACKAGE_LIST_MISSING, \"Solaris pkg-list packages\");\n\nif (empty_or_null(egrep(string:pkg_list, pattern:\"^gimp$\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp\");\n\nflag = 0;\n\nif (solaris_check_release(release:\"0.5.11-0.175.1.4.0.5.0\", sru:\"SRU 4.5\") > 0) flag++;\n\nif (flag)\n{\n error_extra = 'Affected package : gimp\\n' + solaris_get_report2();\n error_extra = ereg_replace(pattern:\"version\", replace:\"OS version\", string:error_extra);\n if (report_verbosity > 0) security_warning(port:0, extra:error_extra);\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_PACKAGE_NOT_AFFECTED, \"gimp\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:09:58", "description": "This update fixes security and stability issues in various image\nformat loaders. Security issues fixed include CVE-2012-3403 and\nCVE-2012-3481.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2012-09-04T00:00:00", "title": "Fedora 16 : gimp-2.6.12-2.fc16 (2012-12364)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "modified": "2012-09-04T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:16", "p-cpe:/a:fedoraproject:fedora:gimp"], "id": "FEDORA_2012-12364.NASL", "href": "https://www.tenable.com/plugins/nessus/61756", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-12364.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61756);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_bugtraq_id(55101);\n script_xref(name:\"FEDORA\", value:\"2012-12364\");\n\n script_name(english:\"Fedora 16 : gimp-2.6.12-2.fc16 (2012-12364)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes security and stability issues in various image\nformat loaders. Security issues fixed include CVE-2012-3403 and\nCVE-2012-3481.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=839020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=847303\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/085888.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bcc4511c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gimp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"gimp-2.6.12-2.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:09:57", "description": "Among other things this update fixes security and stability issues in\nvarious image format loaders. Security issues fixed include\nCVE-2012-3403 and CVE-2012-3481.\n\nOverview of Changes from GIMP 2.8.0 to GIMP 2.8.2\n=================================================\n\nCore :\n\n - Make tag matching always case-insensitive\n\n - Let the tile-cache-size default to half the physical\n memory\n\nGUI :\n\n - Mention that the image was exported in the close warning\n dialog\n\n - Make sure popup windows appear on top on OSX\n\n - Allow file opening by dropping to the OSX dock\n\n - Fix the visibility logic of the export/overwrite menu\n items\n\n - Remove all 'Use GEGL' menu items, they only add bugs\n and zero function\n\n - Improve performance of display filters, especially\n color management\n\n - Fix the image window title to comply with the\n save/export spec and use the same image name\n everywhere, not only in the title\n\n - Fix positioning of pasted/dropped stuff to be more\n reasonable\n\nLibgimp :\n\n - Move gimpdir and thumbnails to proper locations on OSX\n\n - Implement relocation on OSX\n\n - Allow to use $(gimp_installation_dir) in config files\n\nPlug-ins :\n\n - Fix remembering of JPEG load/save defaults\n\n - Revive the page setup dialog on Windows\n\nSource and build system :\n\n - Add Windows installer infrastructure\n\n - Add infrastructure to build GIMP.app on OSX\n\nGeneral :\n\n - Lots of bug fixes\n\n - List of translation updates\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2012-09-18T00:00:00", "title": "Fedora 18 : gimp-2.8.2-1.fc18 (2012-12293)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "modified": "2012-09-18T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:18", "p-cpe:/a:fedoraproject:fedora:gimp"], "id": "FEDORA_2012-12293.NASL", "href": "https://www.tenable.com/plugins/nessus/62135", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-12293.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(62135);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\");\n script_xref(name:\"FEDORA\", value:\"2012-12293\");\n\n script_name(english:\"Fedora 18 : gimp-2.8.2-1.fc18 (2012-12293)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Among other things this update fixes security and stability issues in\nvarious image format loaders. Security issues fixed include\nCVE-2012-3403 and CVE-2012-3481.\n\nOverview of Changes from GIMP 2.8.0 to GIMP 2.8.2\n=================================================\n\nCore :\n\n - Make tag matching always case-insensitive\n\n - Let the tile-cache-size default to half the physical\n memory\n\nGUI :\n\n - Mention that the image was exported in the close warning\n dialog\n\n - Make sure popup windows appear on top on OSX\n\n - Allow file opening by dropping to the OSX dock\n\n - Fix the visibility logic of the export/overwrite menu\n items\n\n - Remove all 'Use GEGL' menu items, they only add bugs\n and zero function\n\n - Improve performance of display filters, especially\n color management\n\n - Fix the image window title to comply with the\n save/export spec and use the same image name\n everywhere, not only in the title\n\n - Fix positioning of pasted/dropped stuff to be more\n reasonable\n\nLibgimp :\n\n - Move gimpdir and thumbnails to proper locations on OSX\n\n - Implement relocation on OSX\n\n - Allow to use $(gimp_installation_dir) in config files\n\nPlug-ins :\n\n - Fix remembering of JPEG load/save defaults\n\n - Revive the page setup dialog on Windows\n\nSource and build system :\n\n - Add Windows installer infrastructure\n\n - Add infrastructure to build GIMP.app on OSX\n\nGeneral :\n\n - Lots of bug fixes\n\n - List of translation updates\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=839020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=847303\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/086964.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2c849e84\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gimp package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"gimp-2.8.2-1.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:46:46", "description": "The GIMP (GNU Image Manipulation Program) is an image composition and\nediting program.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create\na specially crafted GIF image file that, when opened, could cause the\nGIF plug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP. (CVE-2012-3481)\n\nA heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch\n(LZW) decompression algorithm implementation used by the GIMP's GIF\nimage format plug-in. An attacker could create a specially crafted GIF\nimage file that, when opened, could cause the GIF plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user\nrunning the GIMP. (CVE-2011-2896)\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL\nfile format plug-in. An attacker could create a specially crafted KiSS\npalette file that, when opened, could cause the CEL plug-in to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running the GIMP. (CVE-2012-3403)\n\nUsers of the GIMP are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The GIMP\nmust be restarted for the update to take effect.", "edition": 17, "published": "2012-08-21T00:00:00", "title": "Scientific Linux Security Update : gimp on SL6.x i386/x86_64 (20120820)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2011-2896"], "modified": "2012-08-21T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:gimp-help-browser", "p-cpe:/a:fermilab:scientific_linux:gimp-libs", "p-cpe:/a:fermilab:scientific_linux:gimp", "p-cpe:/a:fermilab:scientific_linux:gimp-devel-tools", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:gimp-devel"], "id": "SL_20120820_GIMP_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/61606", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61606);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-2896\", \"CVE-2012-3403\", \"CVE-2012-3481\");\n\n script_name(english:\"Scientific Linux Security Update : gimp on SL6.x i386/x86_64 (20120820)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The GIMP (GNU Image Manipulation Program) is an image composition and\nediting program.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create\na specially crafted GIF image file that, when opened, could cause the\nGIF plug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP. (CVE-2012-3481)\n\nA heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch\n(LZW) decompression algorithm implementation used by the GIMP's GIF\nimage format plug-in. An attacker could create a specially crafted GIF\nimage file that, when opened, could cause the GIF plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user\nrunning the GIMP. (CVE-2011-2896)\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL\nfile format plug-in. An attacker could create a specially crafted KiSS\npalette file that, when opened, could cause the CEL plug-in to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running the GIMP. (CVE-2012-3403)\n\nUsers of the GIMP are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The GIMP\nmust be restarted for the update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1208&L=scientific-linux-errata&T=0&P=1717\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a5b34bf3\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:gimp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:gimp-devel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:gimp-help-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:gimp-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/08/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"gimp-2.6.9-4.el6_3.3\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"gimp-devel-2.6.9-4.el6_3.3\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"gimp-devel-tools-2.6.9-4.el6_3.3\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"gimp-help-browser-2.6.9-4.el6_3.3\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"gimp-libs-2.6.9-4.el6_3.3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gimp / gimp-devel / gimp-devel-tools / gimp-help-browser / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:55:15", "description": "The remote host is affected by the vulnerability described in GLSA-201311-05\n(GIMP: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in GIMP. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to open a specially crafted KiSS\n palette, GIF image or XWD file using GIMP, possibly resulting in\n execution of arbitrary code with the privileges of the process or a\n Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 21, "published": "2013-11-11T00:00:00", "title": "GLSA-201311-05 : GIMP: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-5576"], "modified": "2013-11-11T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:gimp", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201311-05.NASL", "href": "https://www.tenable.com/plugins/nessus/70835", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201311-05.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(70835);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-3403\", \"CVE-2012-3481\", \"CVE-2012-5576\");\n script_bugtraq_id(55101, 56647);\n script_xref(name:\"GLSA\", value:\"201311-05\");\n\n script_name(english:\"GLSA-201311-05 : GIMP: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201311-05\n(GIMP: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in GIMP. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to open a specially crafted KiSS\n palette, GIF image or XWD file using GIMP, possibly resulting in\n execution of arbitrary code with the privileges of the process or a\n Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201311-05\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All GIMP users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-gfx/gimp-2.8.2-r1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:gimp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/11/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-gfx/gimp\", unaffected:make_list(\"ge 2.8.2-r1\"), vulnerable:make_list(\"lt 2.8.2-r1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"GIMP\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2016-09-04T11:53:06", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-3236", "CVE-2012-2763"], "description": "Multiple integer overflows in various decoder plug-ins of\n GIMP have been fixed.\n\n", "edition": 1, "modified": "2012-09-03T11:09:17", "published": "2012-09-03T11:09:17", "id": "OPENSUSE-SU-2012:1080-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html", "type": "suse", "title": "gimp to fix various issues (important)", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T12:10:59", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403"], "description": "This update of The Gimp fixes a heap overflow that could\n have been exploited by attackers to cause a Denial of\n Service (application crash) or even to potentially execute\n arbitrary code (CVE-2012-3403).\n", "edition": 1, "modified": "2012-08-23T16:08:28", "published": "2012-08-23T16:08:28", "id": "SUSE-SU-2012:1029-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00020.html", "title": "Security update for gimp (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T12:14:55", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3481"], "description": "This update of The Gimp fixes a heap overflow that could\n have been exploited by attackers to cause a Denial of\n Service (application crash) or to potentially execute\n arbitrary code (CVE-2012-3481).\n", "edition": 1, "modified": "2012-08-24T23:08:35", "published": "2012-08-24T23:08:35", "id": "SUSE-SU-2012:1038-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00023.html", "type": "suse", "title": "Security update for gimp (important)", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-04T12:39:27", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3402"], "description": "This update of The Gimp fixes a heap overflow that could\n have been exploited by attackers to cause a Denial of\n Service (application crash) or even to potentially execute\n arbitrary code (CVE-2012-3402).\n", "edition": 1, "modified": "2012-08-23T16:08:24", "published": "2012-08-23T16:08:24", "id": "SUSE-SU-2012:1027-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00019.html", "type": "suse", "title": "Security update for gimp (important)", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "kaspersky": [{"lastseen": "2020-09-02T12:00:25", "bulletinFamily": "info", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "### *Detect date*:\n08/25/2012\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple serious vulnerabilities have been found in GIMP. Malicious can use these vulnerabilities to cause denial of service and possibly execute arbitrary code. Below is a complete list of vulnerabilities\n\n### *Affected products*:\nGIMP versions 8 and earlier\n\n### *Solution*:\nUpdate to latest version\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[GIMP](<https://threats.kaspersky.com/en/product/GIMP/>)\n\n### *CVE-IDS*:\n[CVE-2012-3403](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3403>)6.8High \n[CVE-2012-3481](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481>)6.8High", "edition": 42, "modified": "2020-05-22T00:00:00", "published": "2012-08-25T00:00:00", "id": "KLA10167", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10167", "title": "\r KLA10167DoS vulnerabilities in GIMP ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "GIMP (GNU Image Manipulation Program) is a powerful image composition and editing program, which can be extremely useful for creating logos and other graphics for webpages. GIMP has many of the tools and filters you would exp ect to find in similar commercial offerings, and some interesting extras as wel l. GIMP provides a large image manipulation toolbox, including channel operati ons and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. ", "modified": "2012-09-02T00:25:41", "published": "2012-09-02T00:25:41", "id": "FEDORA:461B6210D0", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: gimp-2.6.12-2.fc16", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "GIMP (GNU Image Manipulation Program) is a powerful image composition and editing program, which can be extremely useful for creating logos and other graphics for webpages. GIMP has many of the tools and filters you would exp ect to find in similar commercial offerings, and some interesting extras as wel l. GIMP provides a large image manipulation toolbox, including channel operati ons and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. ", "modified": "2012-09-17T23:09:59", "published": "2012-09-17T23:09:59", "id": "FEDORA:22D1521F11", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: gimp-2.8.2-1.fc18", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481"], "description": "GIMP (GNU Image Manipulation Program) is a powerful image composition and editing program, which can be extremely useful for creating logos and other graphics for webpages. GIMP has many of the tools and filters you would exp ect to find in similar commercial offerings, and some interesting extras as wel l. GIMP provides a large image manipulation toolbox, including channel operati ons and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. ", "modified": "2012-08-28T23:28:57", "published": "2012-08-28T23:28:57", "id": "FEDORA:5F852201C8", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 17 Update: gimp-2.8.2-1.fc17", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-5576"], "description": "GIMP (GNU Image Manipulation Program) is a powerful image composition and editing program, which can be extremely useful for creating logos and other graphics for webpages. GIMP has many of the tools and filters you would exp ect to find in similar commercial offerings, and some interesting extras as wel l. GIMP provides a large image manipulation toolbox, including channel operati ons and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. ", "modified": "2013-02-21T05:37:27", "published": "2013-02-21T05:37:27", "id": "FEDORA:B4FF220A49", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 17 Update: gimp-2.8.4-1.fc17", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:06", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2012-5576"], "description": "### Background\n\nGIMP is the GNU Image Manipulation Program.\n\n### Description\n\nMultiple vulnerabilities have been discovered in GIMP. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to open a specially crafted KiSS palette, GIF image or XWD file using GIMP, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll GIMP users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-gfx/gimp-2.8.2-r1\"", "edition": 1, "modified": "2013-11-10T00:00:00", "published": "2013-11-10T00:00:00", "id": "GLSA-201311-05", "href": "https://security.gentoo.org/glsa/201311-05", "type": "gentoo", "title": "GIMP: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2019-12-20T18:29:34", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2011-2896"], "description": "**CentOS Errata and Security Advisory** CESA-2012:1180\n\n\nThe GIMP (GNU Image Manipulation Program) is an image composition and\nediting program.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create a\nspecially-crafted GIF image file that, when opened, could cause the GIF\nplug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP. (CVE-2012-3481)\n\nA heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW)\ndecompression algorithm implementation used by the GIMP's GIF image format\nplug-in. An attacker could create a specially-crafted GIF image file that,\nwhen opened, could cause the GIF plug-in to crash or, potentially, execute\narbitrary code with the privileges of the user running the GIMP.\n(CVE-2011-2896)\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file\nformat plug-in. An attacker could create a specially-crafted KiSS palette\nfile that, when opened, could cause the CEL plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe GIMP. (CVE-2012-3403)\n\nRed Hat would like to thank Matthias Weckbecker of the SUSE Security Team\nfor reporting the CVE-2012-3481 issue.\n\nUsers of the GIMP are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The GIMP must be\nrestarted for the update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-August/030851.html\n\n**Affected packages:**\ngimp\ngimp-devel\ngimp-devel-tools\ngimp-help-browser\ngimp-libs\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2012-1180.html", "edition": 3, "modified": "2012-08-20T16:23:59", "published": "2012-08-20T16:23:59", "href": "http://lists.centos.org/pipermail/centos-announce/2012-August/030851.html", "id": "CESA-2012:1180", "title": "gimp security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-20T18:28:21", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2009-3909", "CVE-2012-3402", "CVE-2012-3481", "CVE-2011-2896"], "description": "**CentOS Errata and Security Advisory** CESA-2012:1181\n\n\nThe GIMP (GNU Image Manipulation Program) is an image composition and\nediting program.\n\nMultiple integer overflow flaws, leading to heap-based buffer overflows,\nwere found in the GIMP's Adobe Photoshop (PSD) image file plug-in. An\nattacker could create a specially-crafted PSD image file that, when opened,\ncould cause the PSD plug-in to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the GIMP. (CVE-2009-3909,\nCVE-2012-3402)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create a\nspecially-crafted GIF image file that, when opened, could cause the GIF\nplug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP. (CVE-2012-3481)\n\nA heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW)\ndecompression algorithm implementation used by the GIMP's GIF image format\nplug-in. An attacker could create a specially-crafted GIF image file that,\nwhen opened, could cause the GIF plug-in to crash or, potentially, execute\narbitrary code with the privileges of the user running the GIMP.\n(CVE-2011-2896)\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file\nformat plug-in. An attacker could create a specially-crafted KiSS palette\nfile that, when opened, could cause the CEL plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe GIMP. (CVE-2012-3403)\n\nRed Hat would like to thank Secunia Research for reporting CVE-2009-3909,\nand Matthias Weckbecker of the SUSE Security Team for reporting\nCVE-2012-3481.\n\nUsers of the GIMP are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The GIMP must be\nrestarted for the update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-August/030847.html\n\n**Affected packages:**\ngimp\ngimp-devel\ngimp-libs\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2012-1181.html", "edition": 3, "modified": "2012-08-20T15:14:54", "published": "2012-08-20T15:14:54", "href": "http://lists.centos.org/pipermail/centos-announce/2012-August/030847.html", "id": "CESA-2012:1181", "title": "gimp security update", "type": "centos", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:47:07", "bulletinFamily": "unix", "cvelist": ["CVE-2011-2896", "CVE-2012-3403", "CVE-2012-3481"], "description": "The GIMP (GNU Image Manipulation Program) is an image composition and\nediting program.\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create a\nspecially-crafted GIF image file that, when opened, could cause the GIF\nplug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP. (CVE-2012-3481)\n\nA heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW)\ndecompression algorithm implementation used by the GIMP's GIF image format\nplug-in. An attacker could create a specially-crafted GIF image file that,\nwhen opened, could cause the GIF plug-in to crash or, potentially, execute\narbitrary code with the privileges of the user running the GIMP.\n(CVE-2011-2896)\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file\nformat plug-in. An attacker could create a specially-crafted KiSS palette\nfile that, when opened, could cause the CEL plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe GIMP. (CVE-2012-3403)\n\nRed Hat would like to thank Matthias Weckbecker of the SUSE Security Team\nfor reporting the CVE-2012-3481 issue.\n\nUsers of the GIMP are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The GIMP must be\nrestarted for the update to take effect.\n", "modified": "2018-06-06T20:24:30", "published": "2012-08-20T04:00:00", "id": "RHSA-2012:1180", "href": "https://access.redhat.com/errata/RHSA-2012:1180", "type": "redhat", "title": "(RHSA-2012:1180) Moderate: gimp security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:46:37", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3909", "CVE-2011-2896", "CVE-2012-3402", "CVE-2012-3403", "CVE-2012-3481"], "description": "The GIMP (GNU Image Manipulation Program) is an image composition and\nediting program.\n\nMultiple integer overflow flaws, leading to heap-based buffer overflows,\nwere found in the GIMP's Adobe Photoshop (PSD) image file plug-in. An\nattacker could create a specially-crafted PSD image file that, when opened,\ncould cause the PSD plug-in to crash or, potentially, execute arbitrary\ncode with the privileges of the user running the GIMP. (CVE-2009-3909,\nCVE-2012-3402)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the GIMP's GIF image format plug-in. An attacker could create a\nspecially-crafted GIF image file that, when opened, could cause the GIF\nplug-in to crash or, potentially, execute arbitrary code with the\nprivileges of the user running the GIMP. (CVE-2012-3481)\n\nA heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW)\ndecompression algorithm implementation used by the GIMP's GIF image format\nplug-in. An attacker could create a specially-crafted GIF image file that,\nwhen opened, could cause the GIF plug-in to crash or, potentially, execute\narbitrary code with the privileges of the user running the GIMP.\n(CVE-2011-2896)\n\nA heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file\nformat plug-in. An attacker could create a specially-crafted KiSS palette\nfile that, when opened, could cause the CEL plug-in to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nthe GIMP. (CVE-2012-3403)\n\nRed Hat would like to thank Secunia Research for reporting CVE-2009-3909,\nand Matthias Weckbecker of the SUSE Security Team for reporting\nCVE-2012-3481.\n\nUsers of the GIMP are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. The GIMP must be\nrestarted for the update to take effect.\n", "modified": "2017-09-08T11:54:15", "published": "2012-08-20T04:00:00", "id": "RHSA-2012:1181", "href": "https://access.redhat.com/errata/RHSA-2012:1181", "type": "redhat", "title": "(RHSA-2012:1181) Moderate: gimp security update", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:33", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2011-2896"], "description": "[2:2.6.9-4.3]\n- fix overflow in GIF loader (#847303)\n[2:2.6.9-4.2]\n- fix overflows in GIF, CEL loaders (#727800, #839020)", "edition": 4, "modified": "2012-08-20T00:00:00", "published": "2012-08-20T00:00:00", "id": "ELSA-2012-1180", "href": "http://linux.oracle.com/errata/ELSA-2012-1180.html", "title": "gimp security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:38:02", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2009-3909", "CVE-2012-3402", "CVE-2012-3481", "CVE-2011-2896"], "description": "[2:2.2.13-2.0.7.el5_8.5]\n- fix overflow in GIF loader (CVE-2012-3481)\n[2:2.2.13-2.0.7.el5_8.4]\n- fix overflows in PSD plugin (CVE-2009-3909, CVE-2012-3402)\n- fix heap corruption and overflow in GIF plug-in (CVE-2011-2896)\n- fix overflow in CEL plug-in (CVE-2012-3403)", "edition": 4, "modified": "2012-08-20T00:00:00", "published": "2012-08-20T00:00:00", "id": "ELSA-2012-1181", "href": "http://linux.oracle.com/errata/ELSA-2012-1181.html", "title": "gimp security update", "type": "oraclelinux", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:30:15", "bulletinFamily": "unix", "cvelist": ["CVE-2012-3403", "CVE-2012-3481", "CVE-2013-1978", "CVE-2012-5576", "CVE-2013-1913"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2813-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nDecember 09, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : gimp\nVulnerability : several\nProblem type : local(remote)\nDebian-specific: no\nCVE ID : CVE-2013-1913 CVE-2013-1978\n\nMurray McAllister discovered multiple integer and buffer overflows in the\nXWD plugin in Gimp, which can result in the execution of arbitrary code.\n\nFor the oldstable distribution (squeeze), these problems have been fixed \nin version 2.6.10-1+squeeze4. This update also fixes CVE-2012-3403, \nCVE-2012-3481 and CVE-2012-5576.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 2.8.2-2+deb7u1.\n\nFor the unstable distribution (sid), these problems will be fixed soon.\n\nWe recommend that you upgrade your gimp packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 4, "modified": "2013-12-09T17:12:13", "published": "2013-12-09T17:12:13", "id": "DEBIAN:DSA-2813-1:44D3F", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2013/msg00227.html", "title": "[SECURITY] [DSA 2813-1] gimp security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "exploitdb": [{"lastseen": "2016-02-02T11:57:24", "description": "GIMP 2.8.0 FIT File Format DoS. CVE-2012-3236. Dos exploits for multiple platform", "published": "2012-06-30T00:00:00", "type": "exploitdb", "title": "GIMP 2.8.0 FIT File Format DoS", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-3236"], "modified": "2012-06-30T00:00:00", "id": "EDB-ID:19482", "href": "https://www.exploit-db.com/exploits/19482/", "sourceData": "Summary\r\n=======\r\n\r\nThere is a file handling DoS in GIMP (the GNU Image Manipulation Program) for\r\nthe 'fit' file format affecting all versions (Windows and Linux) up to and \r\nincluding 2.8.0. A file in the fit format with a malformed 'XTENSION' header \r\nwill cause a crash in the GIMP program.\r\n\r\nCVE number: CVE-2012-3236\r\nVendor Homepage: http://www.gimp.org/\r\nDate reported to vendor: 25/05/2012\r\nFound by Joseph Sheridan:\r\nhref=\"http://www.reactionpenetrationtesting.co.uk/joseph-sheridan.html\r\n\r\nThis advisory is posted at:\r\nhttp://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html\r\n\r\nPoC file is available here:\r\nhttp://www.reactionpenetrationtesting.co.uk/vuln.fit\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/19482.fit\r\n\r\n\r\nAffected Products\r\n=================\r\n\r\nVulnerable Products\r\n+------------------\r\n\r\nThe following products are known to be affected by this vulnerability:\r\n\r\n* GIMP <= 2.8.0 (Windows or Linux builds)\r\n\r\nProducts Not Vulnerable\r\n+--------------------------------\r\n* GIMP 2.8.1\r\n\r\nDetails\r\n=======\r\n\r\nThere is a file handling DoS in GIMP (the GNU Image Manipulation Program) for\r\nthe 'fit' file format affecting all versions (Windows and Linux) up to 2.8.0. \r\nA file in the fit format with a malformed 'XTENSION' header will cause a crash \r\nin the GIMP program. The flaw is triggered by opening a crafted 'fit' file or \r\nallowing the file explorer dialog to preview the file.\r\n\r\nA file in the fit format starting as follows will trigger the crash:\r\nXTENSIONaaaaaaaaaaaaaaaaaaaaaa...aaaaaaaaaaaaaaaaaaaaaaaaHEADER2...\r\n\r\nThe vulnerable code is in the fits-io.c lines where the program attempts to \r\ncopy from a null pointer:\r\n\r\n{\r\nfdat = fits_decode_card (fits_search_card (hdr, \"XTENSION\"), typ_fstring);\r\nstrcpy (hdulist->xtension, fdat->fstring);\r\n}\r\n\r\nThis code can be patched by changing it to the following (as GIMP 2.8.1):\r\n\r\nfdat = fits_decode_card (fits_search_card (hdr, \"XTENSION\"), typ_fstring);\r\nif(fdat != NULL) {\r\nstrcpy (hdulist->xtension, fdat->fstring);\r\n} else {\r\nstrcpy (errmsg, \"No valid XTENSION header found.\");\r\ngoto err_return;\r\n}\r\n\r\nImpact\r\n======\r\n\r\nSuccessful exploitation of the vulnerability may result in an application \r\ncrash and denial of service.\r\n\r\nSolution\r\n===========\r\nThe GIMP team have provided an update for this issue (release 2.8.1).\r\n\r\nWorkarounds\r\n===========\r\n\r\nThe fits-io.c file can be patched as above.\r\n\r\nDistribution\r\n============\r\n\r\nIn addition to posting on the website, a text version of this notice\r\nis posted to the following e-mail and Usenet news recipients.\r\n\r\n* bugtraq () securityfocus com\r\n* full-disclosure () lists grok org uk\r\n* oss [dash] security [dash] subscribe [at] lists [dot] openwall [dot] com\r\n\r\nFuture updates of this advisory, if any, will be placed on the ReactionIS\r\ncorporate website, but may or may not be actively announced on\r\nmailing lists or newsgroups. Users concerned about this problem are\r\nencouraged to check the URL below for any updates:\r\n\r\nhttp://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html\r\n\r\n========================================================================\r\n====\r\n\r\nReaction Information Security \r\nLombard House Business Centre,\r\nSuite 117,\r\n12-17 Upper Bridge Street,\r\nCanterbury, Kent, CT1 2NF\r\n\r\nPhone: +44 (0)1227 785050\r\nEmail: research () reactionis {dot} co {dot} uk\r\nWeb: http://www.reactionpenetrationtesting.co.uk\r\n\r\nJoseph Sheridan\r\nTechnical Director\r\nPrincipal Consultant\r\nCHECK Team Leader, CREST Infrastructure, CREST Application, CISSP\r\nTel: 07812052515\r\nWeb: www.reactionis.com\r\nEmail: joe (at) reactionis.co (dot) uk [email concealed]\r\n\r\nReaction Information Security Limited.\r\nRegistered in England No: 6929383\r\nRegistered Office: 1, The Mews, 69 New Dover Road, Canterbury, CT1 3DZ\r\n\r\nThis email and any files transmitted with it are confidential and are intended solely for the use of the individual to whom they are addressed. If you are not the intended recipient please notify the sender. Any unauthorised dissemination or copying of this email or its attachments and any use or disclosure of any information contained in them, is strictly prohibited.\r\n\r\n\u00ef\u0081\u0090 Please consider the environment before printing this email", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/19482/"}], "seebug": [{"lastseen": "2017-11-19T16:26:30", "description": "No description provided by source.", "published": "2014-07-01T00:00:00", "title": "GIMP 2.8.0 FIT File Format DoS", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-3236"], "modified": "2014-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-73405", "id": "SSV:73405", "sourceData": "\n Summary\r\n=======\r\n\r\nThere is a file handling DoS in GIMP (the GNU Image Manipulation Program) for\r\nthe 'fit' file format affecting all versions (Windows and Linux) up to and \r\nincluding 2.8.0. A file in the fit format with a malformed 'XTENSION' header \r\nwill cause a crash in the GIMP program.\r\n\r\nCVE number: CVE-2012-3236\r\nVendor Homepage: http://www.gimp.org/\r\nDate reported to vendor: 25/05/2012\r\nFound by Joseph Sheridan:\r\nhref="http://www.reactionpenetrationtesting.co.uk/joseph-sheridan.html\r\n\r\nThis advisory is posted at:\r\nhttp://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html\r\n\r\nPoC file is available here:\r\nhttp://www.reactionpenetrationtesting.co.uk/vuln.fit\r\nhttp://www.exploit-db.com/sploits/19482.fit\r\n\r\n\r\nAffected Products\r\n=================\r\n\r\nVulnerable Products\r\n+------------------\r\n\r\nThe following products are known to be affected by this vulnerability:\r\n\r\n* GIMP <= 2.8.0 (Windows or Linux builds)\r\n\r\nProducts Not Vulnerable\r\n+--------------------------------\r\n* GIMP 2.8.1\r\n\r\nDetails\r\n=======\r\n\r\nThere is a file handling DoS in GIMP (the GNU Image Manipulation Program) for\r\nthe 'fit' file format affecting all versions (Windows and Linux) up to 2.8.0. \r\nA file in the fit format with a malformed 'XTENSION' header will cause a crash \r\nin the GIMP program. The flaw is triggered by opening a crafted 'fit' file or \r\nallowing the file explorer dialog to preview the file.\r\n\r\nA file in the fit format starting as follows will trigger the crash:\r\nXTENSIONaaaaaaaaaaaaaaaaaaaaaa...aaaaaaaaaaaaaaaaaaaaaaaaHEADER2...\r\n\r\nThe vulnerable code is in the fits-io.c lines where the program attempts to \r\ncopy from a null pointer:\r\n\r\n{\r\nfdat = fits_decode_card (fits_search_card (hdr, "XTENSION"), typ_fstring);\r\nstrcpy (hdulist->xtension, fdat->fstring);\r\n}\r\n\r\nThis code can be patched by changing it to the following (as GIMP 2.8.1):\r\n\r\nfdat = fits_decode_card (fits_search_card (hdr, "XTENSION"), typ_fstring);\r\nif(fdat != NULL) {\r\nstrcpy (hdulist->xtension, fdat->fstring);\r\n} else {\r\nstrcpy (errmsg, "No valid XTENSION header found.");\r\ngoto err_return;\r\n}\r\n\r\nImpact\r\n======\r\n\r\nSuccessful exploitation of the vulnerability may result in an application \r\ncrash and denial of service.\r\n\r\nSolution\r\n===========\r\nThe GIMP team have provided an update for this issue (release 2.8.1).\r\n\r\nWorkarounds\r\n===========\r\n\r\nThe fits-io.c file can be patched as above.\r\n\r\nDistribution\r\n============\r\n\r\nIn addition to posting on the website, a text version of this notice\r\nis posted to the following e-mail and Usenet news recipients.\r\n\r\n* bugtraq () securityfocus com\r\n* full-disclosure () lists grok org uk\r\n* oss [dash] security [dash] subscribe [at] lists [dot] openwall [dot] com\r\n\r\nFuture updates of this advisory, if any, will be placed on the ReactionIS\r\ncorporate website, but may or may not be actively announced on\r\nmailing lists or newsgroups. Users concerned about this problem are\r\nencouraged to check the URL below for any updates:\r\n\r\nhttp://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html\r\n\r\n========================================================================\r\n====\r\n\r\nReaction Information Security \r\nLombard House Business Centre,\r\nSuite 117,\r\n12-17 Upper Bridge Street,\r\nCanterbury, Kent, CT1 2NF\r\n\r\nPhone: +44 (0)1227 785050\r\nEmail: research () reactionis {dot} co {dot} uk\r\nWeb: http://www.reactionpenetrationtesting.co.uk\r\n\r\nJoseph Sheridan\r\nTechnical Director\r\nPrincipal Consultant\r\nCHECK Team Leader, CREST Infrastructure, CREST Application, CISSP\r\nTel: 07812052515\r\nWeb: www.reactionis.com\r\nEmail: joe (at) reactionis.co (dot) uk [email concealed]\r\n\r\nReaction Information Security Limited.\r\nRegistered in England No: 6929383\r\nRegistered Office: 1, The Mews, 69 New Dover Road, Canterbury, CT1 3DZ\r\n\r\nThis email and any files transmitted with it are confidential and are intended solely for the use of the individual to whom they are addressed. If you are not the intended recipient please notify the sender. Any unauthorised dissemination or copying of this email or its attachments and any use or disclosure of any information contained in them, is strictly prohibited.\r\n\r\n\uf050 Please consider the environment before printing this email\n ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-73405"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:17", "description": "\nGIMP 2.8.0 - .FIT File Format Denial of Service", "edition": 1, "published": "2012-06-30T00:00:00", "title": "GIMP 2.8.0 - .FIT File Format Denial of Service", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-3236"], "modified": "2012-06-30T00:00:00", "id": "EXPLOITPACK:D5F7525ED72533197171B71A87255AEC", "href": "", "sourceData": "Summary\n=======\n\nThere is a file handling DoS in GIMP (the GNU Image Manipulation Program) for\nthe 'fit' file format affecting all versions (Windows and Linux) up to and \nincluding 2.8.0. A file in the fit format with a malformed 'XTENSION' header \nwill cause a crash in the GIMP program.\n\nCVE number: CVE-2012-3236\nVendor Homepage: http://www.gimp.org/\nDate reported to vendor: 25/05/2012\nFound by Joseph Sheridan:\nhref=\"http://www.reactionpenetrationtesting.co.uk/joseph-sheridan.html\n\nThis advisory is posted at:\nhttp://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html\n\nPoC file is available here:\nhttp://www.reactionpenetrationtesting.co.uk/vuln.fit\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19482.fit\n\n\nAffected Products\n=================\n\nVulnerable Products\n+------------------\n\nThe following products are known to be affected by this vulnerability:\n\n* GIMP <= 2.8.0 (Windows or Linux builds)\n\nProducts Not Vulnerable\n+--------------------------------\n* GIMP 2.8.1\n\nDetails\n=======\n\nThere is a file handling DoS in GIMP (the GNU Image Manipulation Program) for\nthe 'fit' file format affecting all versions (Windows and Linux) up to 2.8.0. \nA file in the fit format with a malformed 'XTENSION' header will cause a crash \nin the GIMP program. The flaw is triggered by opening a crafted 'fit' file or \nallowing the file explorer dialog to preview the file.\n\nA file in the fit format starting as follows will trigger the crash:\nXTENSIONaaaaaaaaaaaaaaaaaaaaaa...aaaaaaaaaaaaaaaaaaaaaaaaHEADER2...\n\nThe vulnerable code is in the fits-io.c lines where the program attempts to \ncopy from a null pointer:\n\n{\nfdat = fits_decode_card (fits_search_card (hdr, \"XTENSION\"), typ_fstring);\nstrcpy (hdulist->xtension, fdat->fstring);\n}\n\nThis code can be patched by changing it to the following (as GIMP 2.8.1):\n\nfdat = fits_decode_card (fits_search_card (hdr, \"XTENSION\"), typ_fstring);\nif(fdat != NULL) {\nstrcpy (hdulist->xtension, fdat->fstring);\n} else {\nstrcpy (errmsg, \"No valid XTENSION header found.\");\ngoto err_return;\n}\n\nImpact\n======\n\nSuccessful exploitation of the vulnerability may result in an application \ncrash and denial of service.\n\nSolution\n===========\nThe GIMP team have provided an update for this issue (release 2.8.1).\n\nWorkarounds\n===========\n\nThe fits-io.c file can be patched as above.\n\nDistribution\n============\n\nIn addition to posting on the website, a text version of this notice\nis posted to the following e-mail and Usenet news recipients.\n\n* bugtraq () securityfocus com\n* full-disclosure () lists grok org uk\n* oss [dash] security [dash] subscribe [at] lists [dot] openwall [dot] com\n\nFuture updates of this advisory, if any, will be placed on the ReactionIS\ncorporate website, but may or may not be actively announced on\nmailing lists or newsgroups. Users concerned about this problem are\nencouraged to check the URL below for any updates:\n\nhttp://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html\n\n========================================================================\n====\n\nReaction Information Security \nLombard House Business Centre,\nSuite 117,\n12-17 Upper Bridge Street,\nCanterbury, Kent, CT1 2NF\n\nPhone: +44 (0)1227 785050\nEmail: research () reactionis {dot} co {dot} uk\nWeb: http://www.reactionpenetrationtesting.co.uk\n\nJoseph Sheridan\nTechnical Director\nPrincipal Consultant\nCHECK Team Leader, CREST Infrastructure, CREST Application, CISSP\nTel: 07812052515\nWeb: www.reactionis.com\nEmail: joe (at) reactionis.co (dot) uk [email concealed]\n\nReaction Information Security Limited.\nRegistered in England No: 6929383\nRegistered Office: 1, The Mews, 69 New Dover Road, Canterbury, CT1 3DZ\n\nThis email and any files transmitted with it are confidential and are intended solely for the use of the individual to whom they are addressed. If you are not the intended recipient please notify the sender. Any unauthorised dissemination or copying of this email or its attachments and any use or disclosure of any information contained in them, is strictly prohibited.\n\n\u00ef\u0081\u0090 Please consider the environment before printing this email", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}]}