First published: Wed Dec 20 2017(Updated: )
In GIMP 2.8.22, there is a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gimp | <2.8.10-0ubuntu1.2 | 2.8.10-0ubuntu1.2 |
ubuntu/gimp | <2.8.20-1.1 | 2.8.20-1.1 |
debian/gimp | <=2.8.20-1<=2.8.14-1 | 2.8.20-1.1 2.8.18-1+deb9u1 2.8.14-1+deb8u2 |
debian/gimp | 2.10.8-2 2.10.8-2+deb10u1 2.10.22-4 2.10.34-1 2.10.36-1 | |
GIMP GIMP | =2.8.22 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17789 is a vulnerability in GIMP 2.8.22 that allows a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c.
The severity of CVE-2017-17789 is high with a CVSS score of 7.8.
CVE-2017-17789 can potentially lead to a heap-based buffer overflow, which may allow attackers to execute arbitrary code or cause a denial of service on an affected system running GIMP 2.8.22.
GIMP versions 2.8.22 and below are affected by CVE-2017-17789.
To fix the CVE-2017-17789 vulnerability in GIMP, it is recommended to upgrade to version 2.10.8 or later, or apply the specific remedies mentioned for your operating system and package manager.