[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2010-4542Date: (C)2011-01-07   (M)2018-07-23


Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-42771
SECUNIA-44750
SECUNIA-48236
SECUNIA-50737
OSVDB-70283
ADV-2011-0016
DSA-2426
GLSA-201209-23
MDVSA-2011:103
RHSA-2011:0838
RHSA-2011:0839
SUSE-SR:2011:005
http://openwall.com/lists/oss-security/2011/01/03/2
http://openwall.com/lists/oss-security/2011/01/04/7
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497
https://bugzilla.redhat.com/show_bug.cgi?id=666793

CPE    1
cpe:/a:gnu:gimp:2.6.11
CWE    1
CWE-119
OVAL    14
oval:org.secpod.oval:def:500098
oval:org.secpod.oval:def:201542
oval:org.secpod.oval:def:200613
oval:org.secpod.oval:def:1000078
...

© SecPod Technologies