Public bug reported: Binary package hint: gimp
>From http://secunia.com/secunia_research/2007-63/advisory : -- Affected Software: Gimp 2.2.15 (Other versions may also be affected.) -- Severity: Rating: Moderately Critical Impact: System Access Where: Remote -- Description of Vulnerability: Secunia Research has discovered a vulnerability in Gimp, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an integer overflow within the function "seek_to_and_unpack_pixeldata()" in plug-ins/common/psd.c. This can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted PSD file with large width or height values. Successful exploitation may allow execution of arbitrary code. -- Solution: Fixed in the SVN repository. -- Credits: Discovered by Stefan Cornelius, Secunia Research. ** Affects: gimp (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-2949 -- Gimp PSD Plugin Integer Overflow Vulnerability https://bugs.launchpad.net/bugs/123972 You received this bug notification because you are a member of Ubuntu Desktop Bugs, which is a bug contact for gimp in ubuntu. -- desktop-bugs mailing list desktop-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/desktop-bugs