Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
References
Configurations
History
21 Nov 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch, Third Party Advisory | |
References | () http://secunia.com/advisories/50737 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory | |
References | () http://securitytracker.com/id?1025586 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link | |
References | () http://www.securityfocus.com/bid/48057 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - Third Party Advisory, VDB Entry |
07 Feb 2022, 17:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CPE | cpe:2.3:a:gnu:gimp:2.4.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.16:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.12:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.17:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:1.2.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:1.0.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.15:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.6:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.3:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.14:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.9:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.13:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.10:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.0.5:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.11:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.7:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.4.2:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.6.4:*:*:*:*:*:*:* cpe:2.3:a:gnu:gimp:2.2.2:*:*:*:*:*:*:* |
|
References | (SECUNIA) http://secunia.com/advisories/50737 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/48057 - Broken Link, Third Party Advisory, VDB Entry | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link | |
References | (SECTRACK) http://securitytracker.com/id?1025586 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - Broken Link | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Issue Tracking, Patch, Third Party Advisory | |
References | (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch, Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - Third Party Advisory, VDB Entry |
Information
Published : 2011-06-06 19:55
Updated : 2024-11-21 01:25
NVD link : CVE-2011-1178
Mitre link : CVE-2011-1178
CVE.ORG link : CVE-2011-1178
JSON object : View
Products Affected
gimp
- gimp
CWE
CWE-190
Integer Overflow or Wraparound