First published: Wed Apr 03 2013(Updated: )
Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP | <=2.6.9 | |
GNOME libraries | <=2.24.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-1913 is considered critical as it can lead to denial of service and potential arbitrary code execution.
To fix CVE-2013-1913, update GIMP to version 2.6.10 or later and ensure that GLib is updated to an appropriate version.
GIMP versions 2.6.9 and earlier are affected by CVE-2013-1913.
Yes, CVE-2013-1913 can be exploited remotely by attackers to crash the application or potentially execute arbitrary code.
CVE-2013-1913 impacts Red Hat Enterprise Linux versions 5.0 and 6.0 among others.