Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce | Patch Third Party Advisory |
http://secunia.com/advisories/50737 | Broken Link |
http://security.gentoo.org/glsa/glsa-201209-23.xml | Third Party Advisory |
http://securitytracker.com/id?1025586 | Broken Link Third Party Advisory VDB Entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 | Broken Link |
http://www.redhat.com/support/errata/RHSA-2011-0837.html | Broken Link |
http://www.redhat.com/support/errata/RHSA-2011-0838.html | Broken Link |
http://www.securityfocus.com/bid/48057 | Broken Link Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=689831 | Issue Tracking Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2011-06-06 19:55
Updated : 2024-02-28 11:41
NVD link : CVE-2011-1178
Mitre link : CVE-2011-1178
CVE.ORG link : CVE-2011-1178
JSON object : View
Products Affected
gimp
- gimp
CWE
CWE-190
Integer Overflow or Wraparound