CVE-2011-1178

Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

History

13 Feb 2023, 04:29

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2011-1178', 'name': 'https://access.redhat.com/security/cve/CVE-2011-1178', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2011:0838', 'name': 'https://access.redhat.com/errata/RHSA-2011:0838', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2011:0837', 'name': 'https://access.redhat.com/errata/RHSA-2011:0837', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2011-1178 Gimp: Integer overflow in the PCX image file plug-in Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.

02 Feb 2023, 17:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2011-1178 -
  • (MISC) https://access.redhat.com/errata/RHSA-2011:0838 -
  • (MISC) https://access.redhat.com/errata/RHSA-2011:0837 -
Summary Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow. CVE-2011-1178 Gimp: Integer overflow in the PCX image file plug-in

07 Feb 2022, 17:50

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:gimp:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.13:*:*:*:*:*:*:*
CWE CWE-189 CWE-190
References (BID) http://www.securityfocus.com/bid/48057 - (BID) http://www.securityfocus.com/bid/48057 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/50737 - (SECUNIA) http://secunia.com/advisories/50737 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/67787 - Third Party Advisory, VDB Entry
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0838.html - Broken Link
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Patch (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=689831 - Issue Tracking, Patch, Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0837.html - Broken Link
References (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce - Patch, Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201209-23.xml - Third Party Advisory
References (SECTRACK) http://securitytracker.com/id?1025586 - (SECTRACK) http://securitytracker.com/id?1025586 - Broken Link, Third Party Advisory, VDB Entry
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:110 - Broken Link

Information

Published : 2011-06-06 19:55

Updated : 2023-12-10 11:03


NVD link : CVE-2011-1178

Mitre link : CVE-2011-1178

CVE.ORG link : CVE-2011-1178


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-190

Integer Overflow or Wraparound