CVE-2012-5576

Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

History

07 Feb 2022, 19:10

Type Values Removed Values Added
CPE cpe:2.3:a:gimp:gimp:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
References (SECUNIA) http://secunia.com/advisories/51528 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/51528 - Broken Link
References (BID) http://www.securityfocus.com/bid/56647 - (BID) http://www.securityfocus.com/bid/56647 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/51479 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/51479 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2012/11/27/1 - (MLIST) http://www.openwall.com/lists/oss-security/2012/11/27/1 - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 - Broken Link
References (CONFIRM) https://bugzilla.gnome.org/show_bug.cgi?id=687392 - Exploit, Patch (CONFIRM) https://bugzilla.gnome.org/show_bug.cgi?id=687392 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 - Patch (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 - Patch, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/50296 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/50296 - Broken Link
References (UBUNTU) http://www.ubuntu.com/usn/USN-1659-1 - Patch (UBUNTU) http://www.ubuntu.com/usn/USN-1659-1 - Patch, Third Party Advisory
CWE CWE-119 CWE-787

Information

Published : 2012-12-18 01:55

Updated : 2024-02-04 18:16


NVD link : CVE-2012-5576

Mitre link : CVE-2012-5576

CVE.ORG link : CVE-2012-5576


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-787

Out-of-bounds Write