CVE-2013-1913

Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2013-1778.html Third Party Advisory Vendor Advisory
http://www.debian.org/security/2013/dsa-2813 Third Party Advisory
http://www.securityfocus.com/bid/64105 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2051-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=947868 Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201603-01 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-1778.html Third Party Advisory Vendor Advisory
http://www.debian.org/security/2013/dsa-2813 Third Party Advisory
http://www.securityfocus.com/bid/64105 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2051-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=947868 Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201603-01 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2013-1778.html - Third Party Advisory, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-1778.html - Third Party Advisory, Vendor Advisory
References () http://www.debian.org/security/2013/dsa-2813 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2813 - Third Party Advisory
References () http://www.securityfocus.com/bid/64105 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/64105 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2051-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2051-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=947868 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=947868 - Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201603-01 - Third Party Advisory () https://security.gentoo.org/glsa/201603-01 - Third Party Advisory

Information

Published : 2013-12-12 18:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1913

Mitre link : CVE-2013-1913

CVE.ORG link : CVE-2013-1913


JSON object : View

Products Affected

gimp

  • gimp

redhat

  • enterprise_linux

gnome

  • glib
CWE
CWE-190

Integer Overflow or Wraparound