[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-3909Date: (C)2009-11-18   (M)2024-01-04


Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
http://www.securityfocus.com/archive/1/507928/100/0/threaded
BID-37040
SECUNIA-37348
SECUNIA-50737
OSVDB-60178
ADV-2009-3270
ADV-2010-1021
DSA-1941
GLSA-201209-23
MDVSA-2009:332
RHSA-2012:1181
SUSE-SR:2010:009
http://git.gnome.org/cgit/gimp/commit/?id=0e440cb6d4d6ee029667363d244aff61b154c33c
http://git.gnome.org/cgit/gimp/commit/?id=9cc8d78ff33b7a36852b74e64b427489cad44d0e
http://secunia.com/secunia_research/2009-43/
https://bugzilla.gnome.org/show_bug.cgi?id=600741

CPE    1
cpe:/a:gimp:gimp:2.6.7
CWE    1
CWE-190
OVAL    7
oval:org.secpod.oval:def:700203
oval:org.secpod.oval:def:202422
oval:org.secpod.oval:def:300674
oval:org.secpod.oval:def:300094
...

© SecPod Technologies