[Security-team] [Fwd: [SA20976] Gimp XCF Parsing Buffer Overflow Vulnerability]
Alexey Borovskoy
=?iso-8859-1?q?alexey=2Eborovskoy_=CE=C1_gmail=2Ecom?=
Сб Июл 8 10:35:43 MSD 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
TITLE:
Gimp XCF Parsing Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA20976
VERIFY ADVISORY:
http://secunia.com/advisories/20976/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
GIMP 2.x
http://secunia.com/product/2922/
DESCRIPTION:
Henning Makholm has reported a vulnerability in Gimp, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a user's system.
The vulnerability is caused due to a boundary error in the
"xcf_load_vector()" function when loading XCF files. This can be
exploited to cause a stack-based buffer overflow when a specially
crafted XCF file with a large "num_axes" value is opened.
Successful exploitation may allow arbitrary code execution.
The vulnerability has been reported for versions 2.2.11 and 2.3.9.
Other versions may also be affected.
SOLUTION:
Update to version 2.2.12.
PROVIDED AND/OR DISCOVERED BY:
Henning Makholm
ORIGINAL ADVISORY:
http://bugzilla.gnome.org/show_bug.cgi?id=346742
- --
Алексей.
GPG key fingerprint
949B BC0E 2C44 7528 4F63 2753 E37A 9E3F 11F3 BDE1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEr1I643qePxHzveERAiaNAJoCFzqUUbFu+V2X4KuRYqouMggcUACfWgLB
msmf1sfbwvtSLk0KzxTFAEs=
=10fZ
-----END PGP SIGNATURE-----
Подробная информация о списке рассылки Security-team