First published: Fri Dec 31 2010(Updated: )
Several stack-based buffer overflows were found in the way gimp processes plug-in configuration files. An attacker could create a a specially-crafted plug-in configuration file and trick the local, unsuspecting user into opening it, which could lead to gimp to crash the plugin or, potentially , arbitrary code execution with the privileges of the user running the executable. Reference: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497</a> Public PoC: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=gimp-overflows-poc-in-cobol.cob;att=1;bug=608497">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=gimp-overflows-poc-in-cobol.cob;att=1;bug=608497</a> Flaw severity note: On systems with compile time buffer checks (FORTIFY_SOURCE) feature enabled, the impact of this flaw is mitigated to be only crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gimp | <2:2.2.13-2.0.7.el5_6.2 | 2:2.2.13-2.0.7.el5_6.2 |
redhat/gimp | <2:2.6.9-4.el6_1.1 | 2:2.6.9-4.el6_1.1 |
GIMP | =2.6.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4540 is considered a high-severity vulnerability due to its potential for arbitrary code execution and denial of service.
To fix CVE-2010-4540, update GIMP to versions 2.6.12 or later where the vulnerability has been addressed.
GIMP version 2.6.11 is specifically affected by CVE-2010-4540.
Yes, CVE-2010-4540 can be exploited remotely if the user opens a specially crafted file.
CVE-2010-4540 can enable denial of service attacks or potential arbitrary code execution.