Numeric Errors Affecting gimp package, versions <2.6.7-1.1
Threat Intelligence
EPSS
6.5% (94th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-GIMP-530367
- published 13 Nov 2009
- disclosed 13 Nov 2009
Introduced: 13 Nov 2009
CVE-2009-1570 Open this link in a new tabHow to fix?
Upgrade Debian:11 gimp to version 2.6.7-1.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gimp package and not the gimp package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
References
- https://security-tracker.debian.org/tracker/CVE-2009-1570
- http://www.securityfocus.com/archive/1/507813/100/0/threaded
- http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe
- http://security.gentoo.org/glsa/glsa-201209-23.xml
- https://bugzilla.gnome.org/show_bug.cgi?id=600484
- http://secunia.com/secunia_research/2009-42/
- http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290
- http://secunia.com/advisories/37232
- http://secunia.com/advisories/50737
- http://www.securityfocus.com/bid/37006
- http://www.vupen.com/english/advisories/2009/3228
- http://www.vupen.com/english/advisories/2009/3564
- http://www.vupen.com/english/advisories/2010/1021
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54254
- http://www.osvdb.org/59930
- http://www.redhat.com/support/errata/RHSA-2011-0837.html
- http://www.redhat.com/support/errata/RHSA-2011-0838.html
CVSS Scores
version 3.1