Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
References
Configurations
History
07 Nov 2023, 02:06
Type | Values Removed | Values Added |
---|---|---|
Summary | Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information. |
Information
Published : 2011-01-07 20:00
Updated : 2024-02-28 11:41
NVD link : CVE-2010-4542
Mitre link : CVE-2010-4542
CVE.ORG link : CVE-2010-4542
JSON object : View
Products Affected
gimp
- gimp
CWE
CWE-787
Out-of-bounds Write