First published: Fri May 13 2011(Updated: )
Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4543.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP | =2.6.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1782 is classified as a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix CVE-2011-1782, users should upgrade to a patched version of GIMP that addresses this vulnerability.
CVE-2011-1782 affects GIMP version 2.6.11 and may allow exploitation through the Paint Shop Pro plugin.
CVE-2011-1782 is a heap-based buffer overflow vulnerability.
By exploiting CVE-2011-1782, attackers could potentially crash the application or execute arbitrary code.