First published: Tue May 31 2011(Updated: )
The GIMP (GNU Image Manipulation Program) is an image composition and<br>editing program.<br>An integer overflow flaw, leading to a heap-based buffer overflow, was<br>found in the GIMP's Microsoft Windows Bitmap (BMP) and Personal Computer<br>eXchange (PCX) image file plug-ins. An attacker could create a<br>specially-crafted BMP or PCX image file that, when opened, could cause the<br>relevant plug-in to crash or, potentially, execute arbitrary code with the<br>privileges of the user running the GIMP. (CVE-2009-1570, CVE-2011-1178)<br>A heap-based buffer overflow flaw was found in the GIMP's Paint Shop Pro<br>(PSP) image file plug-in. An attacker could create a specially-crafted PSP<br>image file that, when opened, could cause the PSP plug-in to crash or,<br>potentially, execute arbitrary code with the privileges of the user running<br>the GIMP. (CVE-2010-4543)<br>A stack-based buffer overflow flaw was found in the GIMP's Sphere Designer<br>image filter. An attacker could create a specially-crafted Sphere Designer<br>filter configuration file that, when opened, could cause the Sphere<br>Designer plug-in to crash or, potentially, execute arbitrary code with the<br>privileges of the user running the GIMP. (CVE-2010-4541)<br>Red Hat would like to thank Stefan Cornelius of Secunia Research for<br>responsibly reporting the CVE-2009-1570 flaw.<br>Users of the GIMP are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. The GIMP must be<br>restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gimp | <2.0.5-7.0.7.el4.1 | 2.0.5-7.0.7.el4.1 |
redhat/gimp | <2.0.5-7.0.7.el4.1 | 2.0.5-7.0.7.el4.1 |
redhat/gimp-devel | <2.0.5-7.0.7.el4.1 | 2.0.5-7.0.7.el4.1 |
redhat/gimp-devel | <2.0.5-7.0.7.el4.1 | 2.0.5-7.0.7.el4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.