Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title GIMP vulnerability
Informations
Name USN-1659-1 First vendor Publication 2012-12-10
Vendor Ubuntu Last vendor Modification 2012-12-10
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 10.04 LTS

Summary:

GIMP could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description: - gimp: The GNU Image Manipulation Program

Details:

It was discovered that GIMP incorrectly handled malformed XWD files. If a user were tricked into opening a specially crafted XWD file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user's privileges.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10:
gimp 2.8.2-1ubuntu1.1

Ubuntu 12.04 LTS:
gimp 2.6.12-1ubuntu1.2

Ubuntu 11.10:
gimp 2.6.11-2ubuntu4.2

Ubuntu 10.04 LTS:
gimp 2.6.8-2ubuntu1.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1659-1
CVE-2012-5576

Package Information:
https://launchpad.net/ubuntu/+source/gimp/2.8.2-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gimp/2.6.12-1ubuntu1.2
https://launchpad.net/ubuntu/+source/gimp/2.6.11-2ubuntu4.2
https://launchpad.net/ubuntu/+source/gimp/2.6.8-2ubuntu1.6

Original Source

Url : http://www.ubuntu.com/usn/USN-1659-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17608
 
Oval ID: oval:org.mitre.oval:def:17608
Title: USN-1659-1 -- gimp vulnerability
Description: GIMP could be made to crash or run programs as your login if it opened a specially crafted file.
Family: unix Class: patch
Reference(s): USN-1659-1
CVE-2012-5576
Version: 7
Platform(s): Ubuntu 12.10
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 10.04
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20340
 
Oval ID: oval:org.mitre.oval:def:20340
Title: DSA-2813-1 gimp - several
Description: Murray McAllister discovered multiple integer and buffer overflows in the XWD plugin in Gimp, which can result in the execution of arbitrary code.
Family: unix Class: patch
Reference(s): DSA-2813-1
CVE-2013-1913
CVE-2013-1978
CVE-2012-3403
CVE-2012-3481
CVE-2012-5576
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): gimp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25494
 
Oval ID: oval:org.mitre.oval:def:25494
Title: SUSE-SU-2014:0214-1 -- Security update for gimp
Description: This update fixes the following security issues with gimp: * bnc#853423: XWD plugin g_new() integer overflow (CVE-2013-1913) * bnc#853425: XWD plugin color map heap-based buffer overflow (CVE-2013-1978) * bnc#791372: memory corruption via XWD files (CVE-2012-5576)
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0214-1
CVE-2013-1913
CVE-2013-1978
CVE-2012-5576
Version: 3
Platform(s): SUSE Linux Enterprise Desktop 11
Product(s): gimp
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 31

OpenVAS Exploits

Date Description
2012-12-11 Name : Ubuntu Update for gimp USN-1659-1
File : nvt/gb_ubuntu_USN_1659_1.nasl

Snort® IPS/IDS

Date Description
2014-11-16 GIMP XWD RedMask file-handling stack buffer overflow attempt
RuleID : 31576 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD GreenMask file-handling stack buffer overflow attempt
RuleID : 31575 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD BlueMask file-handling stack buffer overflow attempt
RuleID : 31574 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD RedMask file-handling stack buffer overflow attempt
RuleID : 31573 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD GreenMask file-handling stack buffer overflow attempt
RuleID : 31572 - Revision : 3 - Type : FILE-IMAGE
2014-11-16 GIMP XWD BlueMask file-handling stack buffer overflow attempt
RuleID : 31571 - Revision : 3 - Type : FILE-IMAGE

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-842.nasl - Type : ACT_GATHER_INFO
2014-02-11 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_gimp-140203.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2813.nasl - Type : ACT_GATHER_INFO
2013-12-10 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20131203_gimp_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-12-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1778.nasl - Type : ACT_GATHER_INFO
2013-11-11 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201311-05.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-082.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2013-2000.nasl - Type : ACT_GATHER_INFO
2012-12-11 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1659-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 12:01:11
  • Multiple Updates
2012-12-18 21:21:52
  • Multiple Updates
2012-12-18 13:20:06
  • Multiple Updates
2012-12-10 17:18:33
  • First insertion