gimp
Page content
- Author: vmiklos
- Vulnerable: 2.2.13-2terminus1
- Unaffected: 2.2.13-2terminus2
Some vulnerabilities have been reported in Gimp, which can be exploited by malicious people to compromise a user’s system.
- An integer overflow exists within the function “seek_to_and_unpack_pixeldata()” in plug-ins/common/psd.c. This can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted PSD file with large width or height values.
- Multiple integer overflows exist within the DICOM, PNM, PSD, PSP, Sun RAS, XBM, and XWD loader plugins. These can potentially be exploited to cause a heap-based buffer overflow by tricking a user into opening specially crafted image files. Successful exploitation may allow execution of arbitrary code.
- Bug Tracker URL: http://bugs.frugalware.org/task/2237