Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title GIMP vulnerability
Informations
Name USN-2051-1 First vendor Publication 2013-12-09
Vendor Ubuntu Last vendor Modification 2013-12-09
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10 - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS

Summary:

GIMP could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description: - gimp: The GNU Image Manipulation Program

Details:

Murray McAllister discovered that GIMP incorrectly handled malformed XWD files. If a user were tricked into opening a specially crafted XWD file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user's privileges.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10:
gimp 2.8.6-1ubuntu1.1

Ubuntu 13.04:
gimp 2.8.4-1ubuntu1.1

Ubuntu 12.10:
gimp 2.8.2-1ubuntu1.2

Ubuntu 12.04 LTS:
gimp 2.6.12-1ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2051-1
CVE-2013-1913, CVE-2013-1978

Package Information:
https://launchpad.net/ubuntu/+source/gimp/2.8.6-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gimp/2.8.4-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gimp/2.8.2-1ubuntu1.2
https://launchpad.net/ubuntu/+source/gimp/2.6.12-1ubuntu1.3

Original Source

Url : http://www.ubuntu.com/usn/USN-2051-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)
50 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21054
 
Oval ID: oval:org.mitre.oval:def:21054
Title: USN-2051-1 -- gimp vulnerability
Description: GIMP could be made to crash or run programs as your login if it opened a specially crafted file.
Family: unix Class: patch
Reference(s): USN-2051-1
CVE-2013-1913
CVE-2013-1978
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21262
 
Oval ID: oval:org.mitre.oval:def:21262
Title: RHSA-2013:1778: gimp security update (Moderate)
Description: Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
Family: unix Class: patch
Reference(s): RHSA-2013:1778-00
CESA-2013:1778
CVE-2012-5576
CVE-2013-1913
CVE-2013-1978
Version: 45
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
CentOS Linux 5
CentOS Linux 6
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23398
 
Oval ID: oval:org.mitre.oval:def:23398
Title: DEPRECATED: ELSA-2013:1778: gimp security update (Moderate)
Description: Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
Family: unix Class: patch
Reference(s): ELSA-2013:1778-00
CVE-2012-5576
CVE-2013-1913
CVE-2013-1978
Version: 18
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23838
 
Oval ID: oval:org.mitre.oval:def:23838
Title: ELSA-2013:1778: gimp security update (Moderate)
Description: Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
Family: unix Class: patch
Reference(s): ELSA-2013:1778-00
CVE-2012-5576
CVE-2013-1913
CVE-2013-1978
Version: 17
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27009
 
Oval ID: oval:org.mitre.oval:def:27009
Title: DEPRECATED: ELSA-2013-1778 -- gimp security update (moderate)
Description: [2:2.6.9-6] - fix overflow in XWD loader (CVE-2013-1913, CVE-2013-1978) [2:2.6.9-5] - fix overflow in XWD loader (#879302) [2:2.6.9-5] - fix overflow in GIF loader (#847303) [2:2.6.9-5] - fix overflows in GIF, CEL loaders (#727800, #839020) [2:2.6.9-4.1] - fix various overflows (#666793, #703403, #703405, #703407, #704512)
Family: unix Class: patch
Reference(s): ELSA-2013-1778
CVE-2012-5576
CVE-2013-1913
CVE-2013-1978
Version: 4
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): gimp
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26
Application 197

Snort® IPS/IDS

Date Description
2014-01-18 GIMP XWD file heap buffer overflow attempt
RuleID : 29010 - Revision : 3 - Type : FILE-OTHER
2014-01-18 GIMP XWD file heap buffer overflow attempt
RuleID : 29009 - Revision : 2 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

Date Description
2016-03-07 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201603-01.nasl - Type : ACT_GATHER_INFO
2014-02-11 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_gimp-140203.nasl - Type : ACT_GATHER_INFO
2013-12-18 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-293.nasl - Type : ACT_GATHER_INFO
2013-12-17 Name : The remote Fedora host is missing a security update.
File : fedora_2013-22771.nasl - Type : ACT_GATHER_INFO
2013-12-17 Name : The remote Fedora host is missing a security update.
File : fedora_2013-22776.nasl - Type : ACT_GATHER_INFO
2013-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2013-22701.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2813.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20131203_gimp_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2051-1.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 12:02:51
  • Multiple Updates
2013-12-13 21:28:59
  • Multiple Updates
2013-12-12 21:24:35
  • Multiple Updates
2013-12-09 17:18:04
  • First insertion