CVE Reference: CVE-2010-4542

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2010-4542

Description:
Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

CVE Status:
Candidate

References:

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html

SAID
  Secunia Advisory: SA42771
  Secunia Advisory: SA44750
  Secunia Advisory: SA50737

REDHAT
  http://www.redhat.com/support/errata/RHSA-2011-0839.html
  http://www.redhat.com/support/errata/RHSA-2011-0838.html

OSVDB
  70283

MLIST
  http://openwall.com/lists/oss-security/2011/01/04/7
  http://openwall.com/lists/oss-security/2011/01/03/2

MISC
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2011:103

GENTOO
  http://security.gentoo.org/glsa/glsa-201209-23.xml

CONFIRM


Return to the previous page.