First published: Sun Jun 24 2018(Updated: )
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP GIMP | <=2.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12713 is a vulnerability in GIMP through version 2.10.2 that allows attackers to overwrite files or read file content that was intended to be private.
CVE-2018-12713 has a severity of critical with a CVSS score of 9.1.
CVE-2018-12713 occurs when GIMP makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, allowing attackers to manipulate files.
Yes, a fix for CVE-2018-12713 has been implemented. It is recommended to update to the latest version of GIMP (2.10.4 or later) to mitigate this vulnerability.
More information about CVE-2018-12713 can be found in the following references: - [GitHub Commit](https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f) - [GitLab Issue](https://gitlab.gnome.org/GNOME/gimp/issues/1689)