First published: Wed Dec 20 2017(Updated: )
In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gimp | <2.8.10-0ubuntu1.2 | 2.8.10-0ubuntu1.2 |
ubuntu/gimp | <2.8.20-1.1 | 2.8.20-1.1 |
debian/gimp | 2.10.8-2 2.10.8-2+deb10u1 2.10.22-4 2.10.34-1 2.10.36-1 | |
GIMP GIMP | =2.8.22 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17786 is a vulnerability in GIMP 2.8.22 that allows heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c.
CVE-2017-17786 affects GIMP version 2.8.22, allowing unexpected bits-per-pixel value for an RGBA image.
The severity of CVE-2017-17786 is high, with a severity value of 7.8.
To fix CVE-2017-17786, upgrade to a version of GIMP that is not affected by the vulnerability.
You can find more information about CVE-2017-17786 on the following references: [1] [2] [3].