CVE-2011-1178

Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
References
Link Resource
http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce Patch Third Party Advisory
http://secunia.com/advisories/50737 Broken Link
http://security.gentoo.org/glsa/glsa-201209-23.xml Third Party Advisory
http://securitytracker.com/id?1025586 Broken Link Third Party Advisory VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0837.html Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0838.html Broken Link
http://www.securityfocus.com/bid/48057 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=689831 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 Third Party Advisory VDB Entry
http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce Patch Third Party Advisory
http://secunia.com/advisories/50737 Broken Link
http://security.gentoo.org/glsa/glsa-201209-23.xml Third Party Advisory
http://securitytracker.com/id?1025586 Broken Link Third Party Advisory VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0837.html Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0838.html Broken Link
http://www.securityfocus.com/bid/48057 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=689831 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch, Third Party Advisory () http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch, Third Party Advisory
References () http://secunia.com/advisories/50737 - Broken Link () http://secunia.com/advisories/50737 - Broken Link
References () http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory
References () http://securitytracker.com/id?1025586 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1025586 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link
References () http://www.securityfocus.com/bid/48057 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/48057 - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - Third Party Advisory, VDB Entry

07 Feb 2022, 17:50

Type Values Removed Values Added
CWE CWE-189 CWE-190
CPE cpe:2.3:a:gnu:gimp:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.2:*:*:*:*:*:*:*
References (SECUNIA) http://secunia.com/advisories/50737 - (SECUNIA) http://secunia.com/advisories/50737 - Broken Link
References (BID) http://www.securityfocus.com/bid/48057 - (BID) http://www.securityfocus.com/bid/48057 - Broken Link, Third Party Advisory, VDB Entry
References (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link
References (SECTRACK) http://securitytracker.com/id?1025586 - (SECTRACK) http://securitytracker.com/id?1025586 - Broken Link, Third Party Advisory, VDB Entry
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - Broken Link
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Patch (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Issue Tracking, Patch, Third Party Advisory
References (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch, Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - Third Party Advisory, VDB Entry

Information

Published : 2011-06-06 19:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1178

Mitre link : CVE-2011-1178

CVE.ORG link : CVE-2011-1178


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-190

Integer Overflow or Wraparound