First published: Wed Dec 20 2017(Updated: )
In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gimp | <2.8.10-0ubuntu1.2 | 2.8.10-0ubuntu1.2 |
ubuntu/gimp | <2.8.20-1.1 | 2.8.20-1.1 |
debian/gimp | 2.10.8-2 2.10.8-2+deb10u1 2.10.22-4 2.10.34-1 2.10.36-1 | |
GIMP GIMP | =2.8.22 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17787 is a vulnerability in GIMP 2.8.22 that allows for a heap-based buffer over-read in the plug-ins/common/file-psp.c file.
CVE-2017-17787 has a severity level of 7.8, which is considered high.
CVE-2017-17787 affects GIMP versions 2.8.22 and earlier.
To fix CVE-2017-17787, you should update your GIMP software to version 2.8.10-0ubuntu1.2 or later.
You can find more information about CVE-2017-17787 at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2017/12/19/5), [Reference 2](https://bugzilla.gnome.org/show_bug.cgi?id=790853), [Reference 3](https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html).