First published: Mon Jan 03 2011(Updated: )
Several stack-based buffer overflows were found in the way gimp processes plug-in configuration files. An attacker could create a a specially-crafted plug-in configuration file and trick the local, unsuspecting user into opening it, which could lead to gimp to crash the plugin or, potentially , arbitrary code execution with the privileges of the user running the executable. Reference: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497</a> Public PoC: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=gimp-overflows-poc-in-cobol.cob;att=1;bug=608497">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=gimp-overflows-poc-in-cobol.cob;att=1;bug=608497</a> Flaw severity note: On systems with compile time buffer checks (FORTIFY_SOURCE) feature enabled, the impact of this flaw is mitigated to be only crash.
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-666793 is reported as high due to the potential for stack-based buffer overflows.
To fix REDHAT-BUG-666793, update GIMP to the latest version that includes the security patches addressing this vulnerability.
REDHAT-BUG-666793 may cause GIMP to crash or potentially allow arbitrary code execution if a user opens a malicious plug-in configuration file.
Users of GIMP who open specially-crafted plug-in configuration files are at risk with REDHAT-BUG-666793.
As of now, there are indications that REDHAT-BUG-666793 could be exploited through specially crafted files, but no widespread exploits have been reported.