First published: Wed Jul 04 2007(Updated: )
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP | <=2.2.15 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =6.10 | |
Ubuntu Linux | =6.06 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2949 has been classified as having a high severity due to its potential to allow arbitrary code execution by remote attackers.
To fix CVE-2007-2949, upgrade GIMP to the latest version that addresses the integer overflow vulnerability.
GIMP versions up to and including 2.2.15 are affected by CVE-2007-2949.
Yes, CVE-2007-2949 can be exploited by opening a maliciously crafted PSD file with GIMP.
CVE-2007-2949 affects GIMP on various Linux distributions, including specific versions of Ubuntu.