Executive Summary
Summary | |
---|---|
Title | gimp security update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:1778 | First vendor Publication | 2013-12-03 |
Vendor | RedHat | Last vendor Modification | 2013-12-03 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The GIMP (GNU Image Manipulation Program) is an image composition and editing program. A stack-based buffer overflow flaw, a heap-based buffer overflow, and an integer overflow flaw were found in the way GIMP loaded certain X Window System (XWD) image dump files. A remote attacker could provide a specially crafted XWD image file that, when processed, would cause the XWD plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-5576, CVE-2013-1913, CVE-2013-1978) The CVE-2013-1913 and CVE-2013-1978 issues were discovered by Murray McAllister of the Red Hat Security Response Team. Users of the GIMP are advised to upgrade to these updated packages, which correct these issues. The GIMP must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 879302 - CVE-2012-5576 gimp (XWD plug-in): Stack-based buffer overflow when loading XWD file 947868 - CVE-2013-1913 gimp: xwd plugin g_new() integer overflow 953902 - CVE-2013-1978 gimp: XWD plugin color map heap-based buffer overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-1778.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
33 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17608 | |||
Oval ID: | oval:org.mitre.oval:def:17608 | ||
Title: | USN-1659-1 -- gimp vulnerability | ||
Description: | GIMP could be made to crash or run programs as your login if it opened a specially crafted file. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1659-1 CVE-2012-5576 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | gimp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20340 | |||
Oval ID: | oval:org.mitre.oval:def:20340 | ||
Title: | DSA-2813-1 gimp - several | ||
Description: | Murray McAllister discovered multiple integer and buffer overflows in the XWD plugin in Gimp, which can result in the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2813-1 CVE-2013-1913 CVE-2013-1978 CVE-2012-3403 CVE-2012-3481 CVE-2012-5576 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | gimp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21054 | |||
Oval ID: | oval:org.mitre.oval:def:21054 | ||
Title: | USN-2051-1 -- gimp vulnerability | ||
Description: | GIMP could be made to crash or run programs as your login if it opened a specially crafted file. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2051-1 CVE-2013-1913 CVE-2013-1978 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 | Product(s): | gimp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21262 | |||
Oval ID: | oval:org.mitre.oval:def:21262 | ||
Title: | RHSA-2013:1778: gimp security update (Moderate) | ||
Description: | Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:1778-00 CESA-2013:1778 CVE-2012-5576 CVE-2013-1913 CVE-2013-1978 | Version: | 45 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | gimp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23398 | |||
Oval ID: | oval:org.mitre.oval:def:23398 | ||
Title: | DEPRECATED: ELSA-2013:1778: gimp security update (Moderate) | ||
Description: | Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:1778-00 CVE-2012-5576 CVE-2013-1913 CVE-2013-1978 | Version: | 18 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | gimp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23838 | |||
Oval ID: | oval:org.mitre.oval:def:23838 | ||
Title: | ELSA-2013:1778: gimp security update (Moderate) | ||
Description: | Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:1778-00 CVE-2012-5576 CVE-2013-1913 CVE-2013-1978 | Version: | 17 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | gimp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25494 | |||
Oval ID: | oval:org.mitre.oval:def:25494 | ||
Title: | SUSE-SU-2014:0214-1 -- Security update for gimp | ||
Description: | This update fixes the following security issues with gimp: * bnc#853423: XWD plugin g_new() integer overflow (CVE-2013-1913) * bnc#853425: XWD plugin color map heap-based buffer overflow (CVE-2013-1978) * bnc#791372: memory corruption via XWD files (CVE-2012-5576) | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0214-1 CVE-2013-1913 CVE-2013-1978 CVE-2012-5576 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Desktop 11 | Product(s): | gimp |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27009 | |||
Oval ID: | oval:org.mitre.oval:def:27009 | ||
Title: | DEPRECATED: ELSA-2013-1778 -- gimp security update (moderate) | ||
Description: | [2:2.6.9-6] - fix overflow in XWD loader (CVE-2013-1913, CVE-2013-1978) [2:2.6.9-5] - fix overflow in XWD loader (#879302) [2:2.6.9-5] - fix overflow in GIF loader (#847303) [2:2.6.9-5] - fix overflows in GIF, CEL loaders (#727800, #839020) [2:2.6.9-4.1] - fix various overflows (#666793, #703403, #703405, #703407, #704512) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1778 CVE-2012-5576 CVE-2013-1913 CVE-2013-1978 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | gimp |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-11 | Name : Ubuntu Update for gimp USN-1659-1 File : nvt/gb_ubuntu_USN_1659_1.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-11-16 | GIMP XWD RedMask file-handling stack buffer overflow attempt RuleID : 31576 - Revision : 3 - Type : FILE-IMAGE |
2014-11-16 | GIMP XWD GreenMask file-handling stack buffer overflow attempt RuleID : 31575 - Revision : 3 - Type : FILE-IMAGE |
2014-11-16 | GIMP XWD BlueMask file-handling stack buffer overflow attempt RuleID : 31574 - Revision : 3 - Type : FILE-IMAGE |
2014-11-16 | GIMP XWD RedMask file-handling stack buffer overflow attempt RuleID : 31573 - Revision : 3 - Type : FILE-IMAGE |
2014-11-16 | GIMP XWD GreenMask file-handling stack buffer overflow attempt RuleID : 31572 - Revision : 3 - Type : FILE-IMAGE |
2014-11-16 | GIMP XWD BlueMask file-handling stack buffer overflow attempt RuleID : 31571 - Revision : 3 - Type : FILE-IMAGE |
2014-01-18 | GIMP XWD file heap buffer overflow attempt RuleID : 29010 - Revision : 3 - Type : FILE-OTHER |
2014-01-18 | GIMP XWD file heap buffer overflow attempt RuleID : 29009 - Revision : 2 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201603-01.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-842.nasl - Type : ACT_GATHER_INFO |
2014-02-11 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_gimp-140203.nasl - Type : ACT_GATHER_INFO |
2013-12-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-293.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22771.nasl - Type : ACT_GATHER_INFO |
2013-12-17 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22776.nasl - Type : ACT_GATHER_INFO |
2013-12-14 | Name : The remote Fedora host is missing a security update. File : fedora_2013-22701.nasl - Type : ACT_GATHER_INFO |
2013-12-10 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20131203_gimp_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-12-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2051-1.nasl - Type : ACT_GATHER_INFO |
2013-12-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2813.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1778.nasl - Type : ACT_GATHER_INFO |
2013-12-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO |
2013-11-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201311-05.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-082.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Fedora host is missing a security update. File : fedora_2013-2000.nasl - Type : ACT_GATHER_INFO |
2012-12-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1659-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:57:39 |
|
2013-12-12 21:24:34 |
|
2013-12-03 21:18:26 |
|