ID CVE-2012-2370
Summary Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:gnome:gdk-pixbuf:2.25.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.25.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.25.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.23.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.23.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.24.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.23.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.23.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.23.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.23.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.24.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.16.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.16.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.16.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.16.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.16.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.16.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.16.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.16.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.17.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.17.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.18.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.18.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.19.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.19.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.21.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.21.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.22.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.22.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.22.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.23.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.23.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.23.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gdk-pixbuf:2.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gdk-pixbuf:2.26.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 13-02-2023 - 04:33)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 822468
title CVE-2012-2370 gdk-pixbuf: DoS (GLib error and application abort) due to an integer overflow in the XBM image file format loader
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • comment gtk2 is earlier than 0:2.10.4-29.el5
          oval oval:com.redhat.rhsa:tst:20130135001
        • comment gtk2 is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20130135002
      • AND
        • comment gtk2-devel is earlier than 0:2.10.4-29.el5
          oval oval:com.redhat.rhsa:tst:20130135003
        • comment gtk2-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20130135004
rhsa
id RHSA-2013:0135
released 2013-01-08
severity Low
title RHSA-2013:0135: gtk2 security and bug fix update (Low)
rpms
  • gtk2-0:2.10.4-29.el5
  • gtk2-debuginfo-0:2.10.4-29.el5
  • gtk2-devel-0:2.10.4-29.el5
refmap via4
bid 53548
confirm
gentoo GLSA-201206-20
misc
mlist
  • [oss-security] 20120515 CVE Request: gdk-pixbuf Integer overflow in XBM file loader
  • [oss-security] 20120515 Re: CVE Request: gdk-pixbuf Integer overflow in XBM file loader
secunia
  • 49125
  • 49715
xf gdkpixbuf-readbitmapfiledata-bo(75578)
Last major update 13-02-2023 - 04:33
Published 13-08-2012 - 20:55
Last modified 13-02-2023 - 04:33
Back to Top