First published: Tue Nov 14 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP GIMP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GIMP vulnerability is ZDI-CAN-22097.
The title of this GIMP vulnerability is ZDI-23-1591: GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability.
This GIMP vulnerability has a severity rating of 7.8 (high).
The GIMP software is affected by this vulnerability.
This GIMP vulnerability can be exploited by remote attackers executing arbitrary code on affected installations of GIMP through user interaction, such as visiting a malicious page or opening a malicious file.