[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-3909

Date: (C)2009-11-18   (M)2015-12-16
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

Reference:
http://www.securityfocus.com/archive/1/archive/1/507928/100/0/threaded
BID-37040
SECUNIA-37348
SECUNIA-50737
OSVDB-60178
ADV-2009-3270
ADV-2010-1021
DSA-1941
GLSA-201209-23
MDVSA-2009:332
RHSA-2012:1181
SUSE-SR:2010:009
http://git.gnome.org/cgit/gimp/commit/?id=0e440cb6d4d6ee029667363d244aff61b154c33c
http://git.gnome.org/cgit/gimp/commit/?id=9cc8d78ff33b7a36852b74e64b427489cad44d0e
http://secunia.com/secunia_research/2009-43/
https://bugzilla.gnome.org/show_bug.cgi?id=600741

CPE    1
cpe:/a:gimp:gimp:2.6.7
CWE    1
CWE-189
OVAL    7
oval:org.secpod.oval:def:300674
oval:org.secpod.oval:def:300094
oval:org.secpod.oval:def:202422
oval:org.secpod.oval:def:500870
...

© 2013 SecPod Technologies