Headline
CVE-2012-3402: security - The Gimp PSD plug-in CVE-2012-3402 issue
Integer overflow in plug-ins/common/psd.c in the Adobe Photoshop PSD plugin in GIMP 2.2.13 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted channels header value in a PSD image file, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2009-3909.
- Products
- Openwall GNU/*/Linux server OS
- Linux Kernel Runtime Guard
- John the Ripper password cracker
- Free & Open Source for any platform
- in the cloud
- Pro for Linux
- Pro for macOS
- Wordlists for password cracking
- passwdqc policy enforcement
- Free & Open Source for Unix
- Pro for Windows (Active Directory)
- yescrypt KDF & password hashing
- yespower Proof-of-Work (PoW)
- crypt_blowfish password hashing
- phpass ditto in PHP
- tcb better password shadowing
- Pluggable Authentication Modules
- scanlogd port scan detector
- popa3d tiny POP3 daemon
- blists web interface to mailing lists
- msulogin single user mode login
- php_mt_seed mt_rand() cracker
- Services
- Publications
- Articles
- Presentations
- Resources
- Mailing lists
- Community wiki
- Source code repositories (GitHub)
- Source code repositories (CVSweb)
- File archive & mirrors
- How to verify digital signatures
- OVE IDs
- What’s new
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 20 Aug 2012 08:26:27 -0400 (EDT) From: Jan Lieskovsky <jlieskov@…hat.com> To: oss-security@…ts.openwall.com Cc: oss-security@…ts.openwall.com, Nils Philippsen <nils@…hat.com>, Florian Weimer <fweimer@…hat.com> Subject: The Gimp PSD plug-in CVE-2012-3402 issue
Hello vendors,
see below report about the GIMP’s PSD plug-in CVE-2012-3402 issue:
Summary: Gimp (PSD plug-in): Heap-buffer overflow by decoding certain PSD headers
CVE: CVE-2012-3402
Description: A heap-based buffer overflow flaw was found in the way Adobe Photoshop™ PSD plug-in of Gimp, the GNU Image Manipulation Program, performed decoding of headers, when loading certain Adobe Photoshop image files. A remote attacker could provide a specially-crafted PSD image file that, when opened in Gimp would lead to PSD plug-in crash or, potentially, arbitrary code execution with the privileges of the user running gimp executable.
Note: A different flaw than CVE-2009-3909.
CVSSv2: 6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P
Affected versions: X <= 2.2.13 Newer versions (gimp-v2.6.X, gimp-v2.8.X, master) are not affected by this issue.
Credit (please credit both people or no one): 1, Issue found by: Jan Lieskovsky, Red Hat Security Response Team 2, Reproducer by: Florian Weimer, Red Hat Product Security Team
Further issue details and relevant patch in: [1] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3402
Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.