CVE-2009-1570

Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
References
Link Resource
http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html Third Party Advisory
http://secunia.com/advisories/37232 Broken Link
http://secunia.com/advisories/50737 Broken Link
http://secunia.com/secunia_research/2009-42/ Broken Link
http://security.gentoo.org/glsa/glsa-201209-23.xml Third Party Advisory
http://www.osvdb.org/59930 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0837.html Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0838.html Broken Link
http://www.securityfocus.com/archive/1/507813/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/37006 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/3228 Broken Link Patch
http://www.vupen.com/english/advisories/2009/3564 Broken Link
http://www.vupen.com/english/advisories/2010/1021 Broken Link
https://bugzilla.gnome.org/show_bug.cgi?id=600484 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 Tool Signature
http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html Third Party Advisory
http://secunia.com/advisories/37232 Broken Link
http://secunia.com/advisories/50737 Broken Link
http://secunia.com/secunia_research/2009-42/ Broken Link
http://security.gentoo.org/glsa/glsa-201209-23.xml Third Party Advisory
http://www.osvdb.org/59930 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0837.html Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0838.html Broken Link
http://www.securityfocus.com/archive/1/507813/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/37006 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/3228 Broken Link Patch
http://www.vupen.com/english/advisories/2009/3564 Broken Link
http://www.vupen.com/english/advisories/2010/1021 Broken Link
https://bugzilla.gnome.org/show_bug.cgi?id=600484 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 Tool Signature
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:2.6.7:*:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe - Patch, Vendor Advisory () http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe - Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - Third Party Advisory
References () http://secunia.com/advisories/37232 - Broken Link () http://secunia.com/advisories/37232 - Broken Link
References () http://secunia.com/advisories/50737 - Broken Link () http://secunia.com/advisories/50737 - Broken Link
References () http://secunia.com/secunia_research/2009-42/ - Broken Link () http://secunia.com/secunia_research/2009-42/ - Broken Link
References () http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory
References () http://www.osvdb.org/59930 - Broken Link () http://www.osvdb.org/59930 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link
References () http://www.securityfocus.com/archive/1/507813/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/507813/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/37006 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/37006 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/3228 - Broken Link, Patch () http://www.vupen.com/english/advisories/2009/3228 - Broken Link, Patch
References () http://www.vupen.com/english/advisories/2009/3564 - Broken Link () http://www.vupen.com/english/advisories/2009/3564 - Broken Link
References () http://www.vupen.com/english/advisories/2010/1021 - Broken Link () http://www.vupen.com/english/advisories/2010/1021 - Broken Link
References () https://bugzilla.gnome.org/show_bug.cgi?id=600484 - Issue Tracking, Third Party Advisory () https://bugzilla.gnome.org/show_bug.cgi?id=600484 - Issue Tracking, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 - Tool Signature () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 - Tool Signature

07 Feb 2022, 17:54

Type Values Removed Values Added
CWE CWE-189 CWE-190
References (VUPEN) http://www.vupen.com/english/advisories/2009/3228 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/3228 - Broken Link, Patch
References (SECUNIA) http://secunia.com/advisories/50737 - (SECUNIA) http://secunia.com/advisories/50737 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 - Tool Signature
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/37232 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37232 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/507813/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/507813/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2009/3564 - (VUPEN) http://www.vupen.com/english/advisories/2009/3564 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2010/1021 - (VUPEN) http://www.vupen.com/english/advisories/2010/1021 - Broken Link
References (BID) http://www.securityfocus.com/bid/37006 - (BID) http://www.securityfocus.com/bid/37006 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://secunia.com/secunia_research/2009-42/ - Vendor Advisory (MISC) http://secunia.com/secunia_research/2009-42/ - Broken Link
References (MISC) https://bugzilla.gnome.org/show_bug.cgi?id=600484 - (MISC) https://bugzilla.gnome.org/show_bug.cgi?id=600484 - Issue Tracking, Third Party Advisory
References (CONFIRM) http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe - Patch (CONFIRM) http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe - Patch, Vendor Advisory
References (OSVDB) http://www.osvdb.org/59930 - (OSVDB) http://www.osvdb.org/59930 - Broken Link

Information

Published : 2009-11-13 15:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1570

Mitre link : CVE-2009-1570

CVE.ORG link : CVE-2009-1570


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-190

Integer Overflow or Wraparound