Stack-based buffer overflow in Gimp - CVE-2012-5576
Published: December 18, 2012 / Updated: August 3, 2020
Gimp
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a large (1) red, (2) green, or (3) blue color mask in an XWD file. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-5576
Sources
- http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1
- http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html
- http://secunia.com/advisories/50296
- http://secunia.com/advisories/51479
- http://secunia.com/advisories/51528
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:082
- http://www.openwall.com/lists/oss-security/2012/11/27/1
- http://www.securityfocus.com/bid/56647
- http://www.ubuntu.com/usn/USN-1659-1
- https://bugzilla.gnome.org/show_bug.cgi?id=687392