CVE-2006-4519

Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.
References
Link Resource
http://bugzilla.gnome.org/show_bug.cgi?id=451379 Issue Tracking Third Party Advisory
http://developer.gimp.org/NEWS-2.2 Broken Link
http://issues.foresightlinux.org/browse/FL-457 Broken Link
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551 Broken Link
http://osvdb.org/42139 Broken Link
http://osvdb.org/42140 Broken Link
http://osvdb.org/42141 Broken Link
http://osvdb.org/42142 Broken Link
http://osvdb.org/42143 Broken Link
http://osvdb.org/42144 Broken Link
http://osvdb.org/42145 Broken Link
http://secunia.com/advisories/26132 Broken Link
http://secunia.com/advisories/26215 Broken Link
http://secunia.com/advisories/26240 Broken Link
http://secunia.com/advisories/26575 Broken Link
http://secunia.com/advisories/26939 Broken Link
http://security.gentoo.org/glsa/glsa-200707-09.xml Third Party Advisory
http://www.debian.org/security/2007/dsa-1335 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:170 Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0513.html Third Party Advisory
http://www.securityfocus.com/archive/1/475257/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24835 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018349 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-494-1 Third Party Advisory
http://www.vupen.com/english/advisories/2007/2471 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/35308 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842 Tool Signature
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

History

07 Feb 2022, 17:56

Type Values Removed Values Added
CPE cpe:2.3:a:the_gimp_team:gimp:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:the_gimp_team:gimp:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
First Time Gimp
Gimp gimp
CWE CWE-189 CWE-190
References (OSVDB) http://osvdb.org/42139 - (OSVDB) http://osvdb.org/42139 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26240 - (SECUNIA) http://secunia.com/advisories/26240 - Broken Link
References (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551 - Vendor Advisory (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551 - Broken Link
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:170 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:170 - Broken Link
References (DEBIAN) http://www.debian.org/security/2007/dsa-1335 - (DEBIAN) http://www.debian.org/security/2007/dsa-1335 - Third Party Advisory
References (OSVDB) http://osvdb.org/42140 - (OSVDB) http://osvdb.org/42140 - Broken Link
References (OSVDB) http://osvdb.org/42144 - (OSVDB) http://osvdb.org/42144 - Broken Link
References (OSVDB) http://osvdb.org/42145 - (OSVDB) http://osvdb.org/42145 - Broken Link
References (OSVDB) http://osvdb.org/42143 - (OSVDB) http://osvdb.org/42143 - Broken Link
References (BID) http://www.securityfocus.com/bid/24835 - (BID) http://www.securityfocus.com/bid/24835 - Third Party Advisory, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842 - Tool Signature
References (CONFIRM) http://developer.gimp.org/NEWS-2.2 - (CONFIRM) http://developer.gimp.org/NEWS-2.2 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26132 - (SECUNIA) http://secunia.com/advisories/26132 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/2471 - (VUPEN) http://www.vupen.com/english/advisories/2007/2471 - Broken Link
References (OSVDB) http://osvdb.org/42141 - (OSVDB) http://osvdb.org/42141 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200707-09.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200707-09.xml - Third Party Advisory
References (CONFIRM) http://issues.foresightlinux.org/browse/FL-457 - (CONFIRM) http://issues.foresightlinux.org/browse/FL-457 - Broken Link
References (OSVDB) http://osvdb.org/42142 - (OSVDB) http://osvdb.org/42142 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26215 - (SECUNIA) http://secunia.com/advisories/26215 - Broken Link
References (UBUNTU) http://www.ubuntu.com/usn/usn-494-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-494-1 - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0513.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0513.html - Third Party Advisory
References (CONFIRM) http://bugzilla.gnome.org/show_bug.cgi?id=451379 - (CONFIRM) http://bugzilla.gnome.org/show_bug.cgi?id=451379 - Issue Tracking, Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/475257/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/475257/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id?1018349 - (SECTRACK) http://www.securitytracker.com/id?1018349 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/26575 - (SECUNIA) http://secunia.com/advisories/26575 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26939 - (SECUNIA) http://secunia.com/advisories/26939 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/35308 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/35308 - Third Party Advisory, VDB Entry

Information

Published : 2007-07-10 18:30

Updated : 2023-12-10 10:40


NVD link : CVE-2006-4519

Mitre link : CVE-2006-4519

CVE.ORG link : CVE-2006-4519


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-190

Integer Overflow or Wraparound