ID CVE-2012-3481
Summary Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
References
Vulnerable Configurations
  • GIMP 2.8.0
    cpe:2.3:a:gimp:gimp:2.8.0
  • GIMP 2.6.3
    cpe:2.3:a:gimp:gimp:2.6.3
  • GIMP 2.2.14
    cpe:2.3:a:gimp:gimp:2.2.14
  • GIMP 2.6.2
    cpe:2.3:a:gimp:gimp:2.6.2
  • GIMP 2.6.4
    cpe:2.3:a:gimp:gimp:2.6.4
  • GIMP 2.4.6
    cpe:2.3:a:gimp:gimp:2.4.6
  • GIMP 2.4.5
    cpe:2.3:a:gimp:gimp:2.4.5
  • GIMP 2.6.0
    cpe:2.3:a:gimp:gimp:2.6.0
  • GIMP 2.4.7
    cpe:2.3:a:gimp:gimp:2.4.7
  • GIMP 2.4.0
    cpe:2.3:a:gimp:gimp:2.4.0
  • GIMP 2.4.4
    cpe:2.3:a:gimp:gimp:2.4.4
  • GIMP 2.4.3
    cpe:2.3:a:gimp:gimp:2.4.3
  • GIMP 2.6.7
    cpe:2.3:a:gimp:gimp:2.6.7
  • GIMP 2.6.11
    cpe:2.3:a:gimp:gimp:2.6.11
  • GIMP 2.6.8
    cpe:2.3:a:gimp:gimp:2.6.8
  • GIMP 2.6.5
    cpe:2.3:a:gimp:gimp:2.6.5
  • GIMP 2.6.6
    cpe:2.3:a:gimp:gimp:2.6.6
  • GIMP 2.6.10
    cpe:2.3:a:gimp:gimp:2.6.10
  • GIMP 2.6.12
    cpe:2.3:a:gimp:gimp:2.6.12
  • GIMP 2.6.1
    cpe:2.3:a:gimp:gimp:2.6.1
  • GIMP 2.6.9
    cpe:2.3:a:gimp:gimp:2.6.9
  • GIMP 2.4.2
    cpe:2.3:a:gimp:gimp:2.4.2
  • GIMP 2.4.1
    cpe:2.3:a:gimp:gimp:2.4.1
  • GIMP 2.2
    cpe:2.3:a:gimp:gimp:2.2
  • GIMP 2.6.13
    cpe:2.3:a:gimp:gimp:2.6.13
CVSS
Base: 6.8 (as of 27-08-2012 - 11:07)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-1181.NASL
    description Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP's Adobe Photoshop (PSD) image file plug-in. An attacker could create a specially crafted PSD image file that, when opened, could cause the PSD plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2009-3909, CVE-2012-3402) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Red Hat would like to thank Secunia Research for reporting CVE-2009-3909, and Matthias Weckbecker of the SUSE Security Team for reporting CVE-2012-3481. Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 61600
    published 2012-08-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61600
    title CentOS 5 : gimp (CESA-2012:1181)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120820_GIMP_ON_SL5_X.NASL
    description The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP's Adobe Photoshop (PSD) image file plug-in. An attacker could create a specially crafted PSD image file that, when opened, could cause the PSD plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2009-3909, CVE-2012-3402) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61605
    published 2012-08-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61605
    title Scientific Linux Security Update : gimp on SL5.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_GIMP-8253.NASL
    description This update of The Gimp fixes a heap overflow that could have been exploited by attackers to cause a Denial of Service (application crash) or to potentially execute arbitrary code. (CVE-2012-3481)
    last seen 2019-02-21
    modified 2012-08-28
    plugin id 61680
    published 2012-08-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61680
    title SuSE 10 Security Update : gimp (ZYPP Patch Number 8253)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2013-082.NASL
    description Updated gimp packages fix security vulnerabilities : An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP (CVE-2012-3481). A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP (CVE-2012-3403). fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. (CVE-2012-3236) GIMP 2.8.2 and earlier is vulnerable to memory corruption when reading XWD files, which could lead even to arbitrary code execution (CVE-2012-5576). Additionally it fixes partial translations in several languages. This gimp update provides the stable maintenance release 2.8.2 which fixes the above security issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 66096
    published 2013-04-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66096
    title Mandriva Linux Security Advisory : gimp (MDVSA-2013:082)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_GIMP-120823.NASL
    description This update of The Gimp fixes a heap overflow that could have been exploited by attackers to cause a Denial of Service (application crash) or to potentially execute arbitrary code. (CVE-2012-3481)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 64149
    published 2013-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64149
    title SuSE 11.1 Security Update : gimp (SAT Patch Number 6712)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2012-142.NASL
    description Multiple vulnerabilities has been discovered and corrected in gimp : A heap-based buffer overflow flaw, leading to invalid free, was found in the way KISS CEL file format plug-in of Gimp, the GNU Image Manipulation Program, performed loading of certain palette files. A remote attacker could provide a specially crafted KISS palette file that, when opened in Gimp would cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the gimp executable (CVE-2012-3403). Integer overflow, leading to heap-based buffer overflow flaw was found in the GIMP's GIF (Graphics Interchange Format) image file plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP (CVE-2012-3481). The updated gimp packages have been upgraded to the 2.6.12 version and patched to correct these issues. Additionally for Mandriva Enterprise server 5 the gegl packages was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9, the enscript packages was added because of a build dependency, the gutenprint and mtink packages was rebuilt against the gimp 2.6.12 libraries.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 61987
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61987
    title Mandriva Linux Security Advisory : gimp (MDVSA-2012:142)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-1181.NASL
    description From Red Hat Security Advisory 2012:1181 : Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP's Adobe Photoshop (PSD) image file plug-in. An attacker could create a specially crafted PSD image file that, when opened, could cause the PSD plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2009-3909, CVE-2012-3402) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Red Hat would like to thank Secunia Research for reporting CVE-2009-3909, and Matthias Weckbecker of the SUSE Security Team for reporting CVE-2012-3481. Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2015-12-01
    plugin id 68601
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68601
    title Oracle Linux 5 : gimp (ELSA-2012-1181)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-583.NASL
    description Fixed 2 gimp security bugs : - fixed bnc#724628 CVE-2012-3481: gimp: GIF plugin 'height' / 'len' integer overflow leading to heap-based buffer overflow - fixed bnc#763595 CVE-2012-2763: gimp: buffer overflow in script-fu's server component
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74745
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74745
    title openSUSE Security Update : gimp (openSUSE-SU-2012:1131-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-543.NASL
    description Multiple integer overflows in various decoder plug-ins of GIMP have been fixed.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74735
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74735
    title openSUSE Security Update : gimp (openSUSE-SU-2012:1080-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1559-1.NASL
    description Joseph Sheridan discovered that GIMP incorrectly handled certain malformed headers in FIT files. If a user were tricked into opening a specially crafted FIT image file, an attacker could cause GIMP to crash. (CVE-2012-3236) Murray McAllister discovered that GIMP incorrectly handled malformed KiSS palette files. If a user were tricked into opening a specially crafted KiSS palette file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user's privileges. (CVE-2012-3403) Matthias Weckbecker discovered that GIMP incorrectly handled malformed GIF image files. If a user were tricked into opening a specially crafted GIF image file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user's privileges. (CVE-2012-3481). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 62037
    published 2012-09-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62037
    title Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : gimp vulnerabilities (USN-1559-1)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_GIMP_20130219.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted KiSS palette file, which triggers an 'invalid free.' (CVE-2012-3403) - Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. (CVE-2012-3481)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80622
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80622
    title Oracle Solaris Third-Party Patch Update : gimp (multiple_vulnerabilities_in_gimp)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-12293.NASL
    description Among other things this update fixes security and stability issues in various image format loaders. Security issues fixed include CVE-2012-3403 and CVE-2012-3481. Overview of Changes from GIMP 2.8.0 to GIMP 2.8.2 ================================================= Core : - Make tag matching always case-insensitive - Let the tile-cache-size default to half the physical memory GUI : - Mention that the image was exported in the close warning dialog - Make sure popup windows appear on top on OSX - Allow file opening by dropping to the OSX dock - Fix the visibility logic of the export/overwrite menu items - Remove all 'Use GEGL' menu items, they only add bugs and zero function - Improve performance of display filters, especially color management - Fix the image window title to comply with the save/export spec and use the same image name everywhere, not only in the title - Fix positioning of pasted/dropped stuff to be more reasonable Libgimp : - Move gimpdir and thumbnails to proper locations on OSX - Implement relocation on OSX - Allow to use $(gimp_installation_dir) in config files Plug-ins : - Fix remembering of JPEG load/save defaults - Revive the page setup dialog on Windows Source and build system : - Add Windows installer infrastructure - Add infrastructure to build GIMP.app on OSX General : - Lots of bug fixes - List of translation updates Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 62135
    published 2012-09-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62135
    title Fedora 18 : gimp-2.8.2-1.fc18 (2012-12293)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-12383.NASL
    description Among other things this update fixes security and stability issues in various image format loaders. Security issues fixed include CVE-2012-3403 and CVE-2012-3481. Overview of Changes from GIMP 2.8.0 to GIMP 2.8.2 ================================================= Core : - Make tag matching always case-insensitive - Let the tile-cache-size default to half the physical memory GUI : - Mention that the image was exported in the close warning dialog - Make sure popup windows appear on top on OSX - Allow file opening by dropping to the OSX dock - Fix the visibility logic of the export/overwrite menu items - Remove all 'Use GEGL' menu items, they only add bugs and zero function - Improve performance of display filters, especially color management - Fix the image window title to comply with the save/export spec and use the same image name everywhere, not only in the title - Fix positioning of pasted/dropped stuff to be more reasonable Libgimp : - Move gimpdir and thumbnails to proper locations on OSX - Implement relocation on OSX - Allow to use $(gimp_installation_dir) in config files Plug-ins : - Fix remembering of JPEG load/save defaults - Revive the page setup dialog on Windows Source and build system : - Add Windows installer infrastructure - Add infrastructure to build GIMP.app on OSX General : - Lots of bug fixes - List of translation updates Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 61703
    published 2012-08-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61703
    title Fedora 17 : gimp-2.8.2-1.fc17 (2012-12383)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-1180.NASL
    description From Red Hat Security Advisory 2012:1180 : Updated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Red Hat would like to thank Matthias Weckbecker of the SUSE Security Team for reporting the CVE-2012-3481 issue. Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-08-13
    plugin id 68600
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68600
    title Oracle Linux 6 : gimp (ELSA-2012-1180)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-1180.NASL
    description Updated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Red Hat would like to thank Matthias Weckbecker of the SUSE Security Team for reporting the CVE-2012-3481 issue. Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 61603
    published 2012-08-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61603
    title RHEL 6 : gimp (RHSA-2012:1180)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-12364.NASL
    description This update fixes security and stability issues in various image format loaders. Security issues fixed include CVE-2012-3403 and CVE-2012-3481. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 61756
    published 2012-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61756
    title Fedora 16 : gimp-2.6.12-2.fc16 (2012-12364)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120820_GIMP_ON_SL6_X.NASL
    description The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61606
    published 2012-08-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61606
    title Scientific Linux Security Update : gimp on SL6.x i386/x86_64
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201311-05.NASL
    description The remote host is affected by the vulnerability described in GLSA-201311-05 (GIMP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in GIMP. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted KiSS palette, GIF image or XWD file using GIMP, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 70835
    published 2013-11-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70835
    title GLSA-201311-05 : GIMP: Multiple vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-1181.NASL
    description Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP's Adobe Photoshop (PSD) image file plug-in. An attacker could create a specially crafted PSD image file that, when opened, could cause the PSD plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2009-3909, CVE-2012-3402) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Red Hat would like to thank Secunia Research for reporting CVE-2009-3909, and Matthias Weckbecker of the SUSE Security Team for reporting CVE-2012-3481. Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 61604
    published 2012-08-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61604
    title RHEL 5 : gimp (RHSA-2012:1181)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-1180.NASL
    description Updated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3481) A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the GIMP's GIF image format plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2011-2896) A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL file format plug-in. An attacker could create a specially crafted KiSS palette file that, when opened, could cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. (CVE-2012-3403) Red Hat would like to thank Matthias Weckbecker of the SUSE Security Team for reporting the CVE-2012-3481 issue. Users of the GIMP are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The GIMP must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 61599
    published 2012-08-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61599
    title CentOS 6 : gimp (CESA-2012:1180)
redhat via4
advisories
  • bugzilla
    id 847303
    title CVE-2012-3481 Gimp (GIF plug-in): Heap-based buffer overflow by loading certain GIF images
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment gimp is earlier than 2:2.6.9-4.el6_3.3
          oval oval:com.redhat.rhsa:tst:20121180005
        • comment gimp is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110839006
      • AND
        • comment gimp-devel is earlier than 2:2.6.9-4.el6_3.3
          oval oval:com.redhat.rhsa:tst:20121180013
        • comment gimp-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110839014
      • AND
        • comment gimp-devel-tools is earlier than 2:2.6.9-4.el6_3.3
          oval oval:com.redhat.rhsa:tst:20121180011
        • comment gimp-devel-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110839012
      • AND
        • comment gimp-help-browser is earlier than 2:2.6.9-4.el6_3.3
          oval oval:com.redhat.rhsa:tst:20121180009
        • comment gimp-help-browser is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110839008
      • AND
        • comment gimp-libs is earlier than 2:2.6.9-4.el6_3.3
          oval oval:com.redhat.rhsa:tst:20121180007
        • comment gimp-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110839010
    rhsa
    id RHSA-2012:1180
    released 2012-08-20
    severity Moderate
    title RHSA-2012:1180: gimp security update (Moderate)
  • bugzilla
    id 847303
    title CVE-2012-3481 Gimp (GIF plug-in): Heap-based buffer overflow by loading certain GIF images
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment gimp is earlier than 2:2.2.13-2.0.7.el5_8.5
          oval oval:com.redhat.rhsa:tst:20121181002
        • comment gimp is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070343013
      • AND
        • comment gimp-devel is earlier than 2:2.2.13-2.0.7.el5_8.5
          oval oval:com.redhat.rhsa:tst:20121181004
        • comment gimp-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070343015
      • AND
        • comment gimp-libs is earlier than 2:2.2.13-2.0.7.el5_8.5
          oval oval:com.redhat.rhsa:tst:20121181006
        • comment gimp-libs is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070343017
    rhsa
    id RHSA-2012:1181
    released 2012-08-20
    severity Moderate
    title RHSA-2012:1181: gimp security update (Moderate)
rpms
  • gimp-2:2.6.9-4.el6_3.3
  • gimp-devel-2:2.6.9-4.el6_3.3
  • gimp-devel-tools-2:2.6.9-4.el6_3.3
  • gimp-help-browser-2:2.6.9-4.el6_3.3
  • gimp-libs-2:2.6.9-4.el6_3.3
  • gimp-2:2.2.13-2.0.7.el5_8.5
  • gimp-devel-2:2.2.13-2.0.7.el5_8.5
  • gimp-libs-2:2.2.13-2.0.7.el5_8.5
refmap via4
bid 55101
mandriva
  • MDVSA-2012:142
  • MDVSA-2013:082
misc
mlist [oss-security] 20120820 The Gimp GIF plug-in CVE-2012-3481 issue
sectrack 1027411
secunia 50296
suse
  • SUSE-SU-2012:1038
  • openSUSE-SU-2012:1080
  • openSUSE-SU-2012:1131
ubuntu USN-1559-1
Last major update 05-12-2013 - 00:15
Published 25-08-2012 - 06:29
Back to Top