9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
gimp is vulnerable to arbitrary code execution. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMPβs Microsoft Windows Bitmap (BMP) and Personal Computer eXchange (PCX) image file plug-ins. An attacker could create a specially-crafted BMP or PCX image file that, when opened, could cause the relevant plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP.
CPE | Name | Operator | Version |
---|---|---|---|
gimp | eq | 2.2.13__2.el5 | |
gimp | eq | 2.0.5__6.2.el4 |
git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe
lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
secunia.com/advisories/37232
secunia.com/advisories/50737
secunia.com/secunia_research/2009-42/
security.gentoo.org/glsa/glsa-201209-23.xml
www.osvdb.org/59930
www.redhat.com/support/errata/RHSA-2011-0837.html
www.redhat.com/support/errata/RHSA-2011-0838.html
www.securityfocus.com/archive/1/507813/100/0/threaded
www.securityfocus.com/bid/37006
www.vupen.com/english/advisories/2009/3228
www.vupen.com/english/advisories/2009/3564
www.vupen.com/english/advisories/2010/1021
access.redhat.com/errata/RHSA-2011:0838
access.redhat.com/security/updates/classification/#moderate
bugzilla.gnome.org/show_bug.cgi?id=600484
exchange.xforce.ibmcloud.com/vulnerabilities/54254
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290