Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2012-5576 First vendor Publication 2012-12-17
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17608
 
Oval ID: oval:org.mitre.oval:def:17608
Title: USN-1659-1 -- gimp vulnerability
Description: GIMP could be made to crash or run programs as your login if it opened a specially crafted file.
Family: unix Class: patch
Reference(s): USN-1659-1
CVE-2012-5576
Version: 7
Platform(s): Ubuntu 12.10
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 10.04
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20340
 
Oval ID: oval:org.mitre.oval:def:20340
Title: DSA-2813-1 gimp - several
Description: Murray McAllister discovered multiple integer and buffer overflows in the XWD plugin in Gimp, which can result in the execution of arbitrary code.
Family: unix Class: patch
Reference(s): DSA-2813-1
CVE-2013-1913
CVE-2013-1978
CVE-2012-3403
CVE-2012-3481
CVE-2012-5576
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25494
 
Oval ID: oval:org.mitre.oval:def:25494
Title: SUSE-SU-2014:0214-1 -- Security update for gimp
Description: This update fixes the following security issues with gimp: * bnc#853423: XWD plugin g_new() integer overflow (CVE-2013-1913) * bnc#853425: XWD plugin color map heap-based buffer overflow (CVE-2013-1978) * bnc#791372: memory corruption via XWD files (CVE-2012-5576)
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0214-1
CVE-2013-1913
CVE-2013-1978
CVE-2012-5576
Version: 3
Platform(s): SUSE Linux Enterprise Desktop 11
Product(s): gimp
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 31

OpenVAS Exploits

Date Description
2012-12-11 Name : Ubuntu Update for gimp USN-1659-1
File : nvt/gb_ubuntu_USN_1659_1.nasl

Snort® IPS/IDS

Date Description
2014-11-16 GIMP XWD RedMask file-handling stack buffer overflow attempt
RuleID : 31576 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD GreenMask file-handling stack buffer overflow attempt
RuleID : 31575 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD BlueMask file-handling stack buffer overflow attempt
RuleID : 31574 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD RedMask file-handling stack buffer overflow attempt
RuleID : 31573 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD GreenMask file-handling stack buffer overflow attempt
RuleID : 31572 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD BlueMask file-handling stack buffer overflow attempt
RuleID : 31571 - Revision : 3 - Type : FILE-IMAGE

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-842.nasl - Type : ACT_GATHER_INFO
2014-02-11 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_gimp-140203.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2813.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20131203_gimp_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-11-11 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201311-05.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-082.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2000.nasl - Type : ACT_GATHER_INFO
2012-12-11 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1659-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/56647
CONFIRM http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d...
https://bugzilla.gnome.org/show_bug.cgi?id=687392
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2013:082
MLIST http://www.openwall.com/lists/oss-security/2012/11/27/1
SECUNIA http://secunia.com/advisories/50296
http://secunia.com/advisories/51479
http://secunia.com/advisories/51528
SUSE http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html
http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html
UBUNTU http://www.ubuntu.com/usn/USN-1659-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2023-02-13 09:28:37
  • Multiple Updates
2023-02-02 21:28:40
  • Multiple Updates
2022-02-08 12:13:26
  • Multiple Updates
2021-05-04 12:22:36
  • Multiple Updates
2021-04-22 01:26:59
  • Multiple Updates
2020-05-23 00:35:17
  • Multiple Updates
2016-04-26 22:29:52
  • Multiple Updates
2014-11-16 21:24:38
  • Multiple Updates
2014-06-14 13:33:58
  • Multiple Updates
2014-02-17 11:14:23
  • Multiple Updates
2013-12-05 17:19:20
  • Multiple Updates
2013-05-10 22:49:46
  • Multiple Updates
2013-02-02 13:23:28
  • Multiple Updates
2012-12-18 21:21:17
  • Multiple Updates
2012-12-18 13:19:33
  • First insertion