CVE-2009-1570

Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:2.6.7:*:*:*:*:*:*:*

History

07 Feb 2022, 17:54

Type Values Removed Values Added
CWE CWE-189 CWE-190
References (VUPEN) http://www.vupen.com/english/advisories/2010/1021 - (VUPEN) http://www.vupen.com/english/advisories/2010/1021 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290 - Tool Signature
References (CONFIRM) http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe - Patch (CONFIRM) http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe - Patch, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/50737 - (SECUNIA) http://secunia.com/advisories/50737 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54254 - Third Party Advisory, VDB Entry
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link
References (OSVDB) http://www.osvdb.org/59930 - (OSVDB) http://www.osvdb.org/59930 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/3564 - (VUPEN) http://www.vupen.com/english/advisories/2009/3564 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/3228 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/3228 - Broken Link, Patch
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/507813/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/507813/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link
References (MISC) http://secunia.com/secunia_research/2009-42/ - Vendor Advisory (MISC) http://secunia.com/secunia_research/2009-42/ - Broken Link
References (SECUNIA) http://secunia.com/advisories/37232 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37232 - Broken Link
References (MISC) https://bugzilla.gnome.org/show_bug.cgi?id=600484 - (MISC) https://bugzilla.gnome.org/show_bug.cgi?id=600484 - Issue Tracking, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/37006 - (BID) http://www.securityfocus.com/bid/37006 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2009-11-13 15:30

Updated : 2023-12-10 10:51


NVD link : CVE-2009-1570

Mitre link : CVE-2009-1570

CVE.ORG link : CVE-2009-1570


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-190

Integer Overflow or Wraparound