Executive Summary
Summary | |
---|---|
Title | gimp security update |
Informations | |||
---|---|---|---|
Name | RHSA-2006:0598 | First vendor Publication | 2006-07-18 |
Vendor | RedHat | Last vendor Modification | 2006-07-18 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated gimp packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Henning Makholm discovered a buffer overflow bug in The GIMP XCF file loader. An attacker could create a carefully crafted image that could execute arbitrary code if opened by a victim. (CVE-2006-3404) Please note that this issue did not affect the gimp packages in Red Hat Enterprise Linux 2.1, or 3. Users of The GIMP should update to these erratum packages which contain a backported fix to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 198269 - CVE-2006-3404 gimp xcf buffer overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2006-0598.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11259 | |||
Oval ID: | oval:org.mitre.oval:def:11259 | ||
Title: | Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property. | ||
Description: | Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3404 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5908 | |||
Oval ID: | oval:org.mitre.oval:def:5908 | ||
Title: | Security Vulnerability in GIMP(1) May Lead to Denial of Service (DoS) or Execution of Arbitrary Code | ||
Description: | Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-3404 | Version: | 1 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 6 |
OpenVAS Exploits
Date | Description |
---|---|
2009-09-23 | Name : Solaris Update for GNOME 2.6.0 122212-33 File : nvt/gb_solaris_122212_33.nasl |
2009-09-23 | Name : Solaris Update for GNOME Desktop 122213-33 File : nvt/gb_solaris_122213_33.nasl |
2009-06-03 | Name : Solaris Update for GNOME 2.6.0 122212-32 File : nvt/gb_solaris_122212_32.nasl |
2009-06-03 | Name : Solaris Update for GNOME Desktop 122213-32 File : nvt/gb_solaris_122213_32.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200607-08 (gimp) File : nvt/glsa_200607_08.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1116-1 (gimp) File : nvt/deb_1116_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2006-207-03 gimp File : nvt/esoft_slk_ssa_2006_207_03.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
27037 | GIMP XCF Parsing xcf_load_vector() Function Overflow A remote overflow exists in Gimp. The xcf_load_vector() function fails to handle XCF files with a large 'num_axes' value resulting in a buffer overflow. With a specially crafted XCF file, an attacker can execute remote arbitrary code or cause denial of service resulting in a loss of integrity or availability. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_gimp-1920.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-312-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_gimp-1921.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_gimp-unstable-1919.nasl - Type : ACT_GATHER_INFO |
2006-12-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-127.nasl - Type : ACT_GATHER_INFO |
2006-11-06 | Name : The remote host is missing Sun Security Patch number 122212-46 File : solaris10_122212.nasl - Type : ACT_GATHER_INFO |
2006-11-06 | Name : The remote host is missing Sun Security Patch number 122213-46 File : solaris10_x86_122213.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1116.nasl - Type : ACT_GATHER_INFO |
2006-07-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2006-207-03.nasl - Type : ACT_GATHER_INFO |
2006-07-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200607-08.nasl - Type : ACT_GATHER_INFO |
2006-07-19 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0598.nasl - Type : ACT_GATHER_INFO |
2006-07-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0598.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:50:08 |
|