SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   GNU Image Manipulation Program (GIMP) Vendors:   GNU [multiple authors]
GNU Image Manipulation Program (GIMP) PSD/KiSS/GIF Heap Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1027411
SecurityTracker URL:  http://securitytracker.com/id/1027411
CVE Reference:   CVE-2012-3402, CVE-2012-3403, CVE-2012-3481   (Links to External Site)
Date:  Aug 20 2012
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.2.x, 2.6.x, 2.8.x
Description:   A vulnerability was reported in GNU Image Manipulation Program (GIMP). A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted file that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

A specially crafted Adobe Photoshop image file can trigger a heap overflow in the PSD plug-in [CVE-2012-3402]. Versions 2.2.13 and prior are affected. Jan Lieskovsky of the Red Hat Security Response Team reported this vulnerability.

A specially crafted KiSS palette file can trigger a heap overflow in the KiSS CEL file format plug-in [CVE-2012-3403]. Murray McAllister of the Red Hat Security Response Team reported this vulnerability.

A specially crafted GIF image file can trigger a heap overflow in the GIF plug-in [CVE-2012-3481]. Matthias Weckbecker of the SUSE Security Team reported this vulnerability.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued patches.
Vendor URL:  www.gimp.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Aug 20 2012 (Red Hat Issues Fix) GNU Image Manipulation Program (GIMP) PSD/KiSS/GIF Heap Overflows Let Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Aug 20 2012 (Red Hat Issues Fix) GNU Image Manipulation Program (GIMP) PSD/KiSS/GIF Heap Overflows Let Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 5.
Feb 20 2013 (Oracle Issues Fix for Solaris) GNU Image Manipulation Program (GIMP) PSD/KiSS/GIF Heap Overflows Let Remote Users Execute Arbitrary Code
Oracle has issued a fix for Solaris 11.1.



 Source Message Contents

Date:  Mon, 20 Aug 2012 14:28:28 +0000
Subject:  GIMP


CVE-2012-3402
CVE-2012-3403
CVE-2012-3481 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC