Public bug reported:

Binary package hint: gimp

>From http://secunia.com/secunia_research/2007-63/advisory :

-- Affected Software: Gimp 2.2.15
(Other versions may also be affected.)

-- Severity:
Rating: Moderately Critical
Impact: System Access
Where:  Remote

-- Description of Vulnerability:
Secunia Research has discovered a vulnerability in Gimp, which can be
exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an integer overflow within the
function "seek_to_and_unpack_pixeldata()" in plug-ins/common/psd.c.
This can be exploited to cause a heap-based buffer overflow by
tricking a user into opening a specially crafted PSD file with large
width or height values.

Successful exploitation may allow execution of arbitrary code.

-- Solution:
Fixed in the SVN repository.

-- Credits:
Discovered by Stefan Cornelius, Secunia Research.

** Affects: gimp (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-2949

-- 
Gimp PSD Plugin Integer Overflow Vulnerability
https://bugs.launchpad.net/bugs/123972
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is a bug contact for gimp in ubuntu.

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to