|Title||gimp security update|
|Name||DSA-2426||First vendor Publication||2012-03-06|
|Vendor||Debian||Last vendor Modification||2012-03-06|
Security-Database Scoring CVSS v2
|Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)|
|Cvss Base Score||9.3||Attack Range||Network|
|Cvss Impact Score||10||Attack Complexity||Medium|
|Cvss Expoit Score||8.6||Authentification||None Required|
|Calculate full CVSS 2.0 Vectors scores|
Several vulnerabilities have been identified in GIMP, the GNU Image Manipulation Program.
CVE-2010-4540 Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS > LIGHT" plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.
CVE-2010-4541 Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.
CVE-2010-4542 Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in in the GFIG plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.
CVE-2010-4543 Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.
CVE-2011-1782 The correction for CVE-2010-4543 was incomplete.
CVE-2011-2896 The LZW decompressor in the LZWReadByte function in plug-ins/common/file-gif-load.c does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream.
For the stable distribution (squeeze), these problems have been fixed in version 2.6.10-1+squeeze3.
For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in version 2.6.11-5.
We recommend that you upgrade your gimp packages.
|Url : http://www.debian.org/security/2012/dsa-2426|
CWE : Common Weakness Enumeration
|CWE-119||Failure to Constrain Operations within the Bounds of a Memory Buffer|
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
|74539||GIMP plug-ins/common/file-gif-load.c LZWReadByte() Function GIF File Handling...|
|70284||GIMP plug-ins/common/file-psp.c read_channel_data() Function Overflow|
|70283||GIMP plug-ins/gfig/gfig-style.c gfig_read_parameter_gimp_rgb() Function Overflow|
|70282||GIMP plug-ins/lighting/lighting-ui.c load_preset_response() Function Overflow|
|70281||GIMP plug-ins/common/sphere-designer.c loadit() Function Overflow|