[Forgot Password]
Login  Register Subscribe

23631

 
 

115036

 
 

95906

 
 

909

 
 

77949

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-4542

Date: (C)2011-01-07   (M)2016-03-13
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

Reference:
SECUNIA-42771
SECUNIA-44750
SECUNIA-50737
OSVDB-70283
ADV-2011-0016
GLSA-201209-23
MDVSA-2011:103
RHSA-2011:0838
RHSA-2011:0839
SUSE-SR:2011:005
http://openwall.com/lists/oss-security/2011/01/03/2
http://openwall.com/lists/oss-security/2011/01/04/7
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497
https://bugzilla.redhat.com/show_bug.cgi?id=666793

CPE    1
cpe:/a:gnu:gimp:2.6.11
CWE    1
CWE-119
OVAL    14
oval:org.secpod.oval:def:1000078
oval:org.secpod.oval:def:700286
oval:org.secpod.oval:def:600749
oval:org.secpod.oval:def:500177
...

© 2013 SecPod Technologies