First published: Fri Dec 31 2010(Updated: )
Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gimp | <2:2.2.13-2.0.7.el5_6.2 | 2:2.2.13-2.0.7.el5_6.2 |
redhat/gimp | <2:2.6.9-4.el6_1.1 | 2:2.6.9-4.el6_1.1 |
GIMP GIMP | =2.6.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.