CVE-2012-3236

fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

History

07 Feb 2022, 18:40

Type Values Removed Values Added
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/76658 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/76658 - Third Party Advisory, VDB Entry
References (UBUNTU) http://www.ubuntu.com/usn/USN-1559-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1559-1 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/54246 - (BID) http://www.securityfocus.com/bid/54246 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html - Exploit (MISC) http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html - Exploit, Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 - Broken Link
References (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html - Exploit (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html - Broken Link, Exploit
References (CONFIRM) https://bugzilla.gnome.org/show_bug.cgi?id=676804 - (CONFIRM) https://bugzilla.gnome.org/show_bug.cgi?id=676804 - Issue Tracking, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html - Third Party Advisory
References (EXPLOIT-DB) http://www.exploit-db.com/exploits/19482 - Exploit (EXPLOIT-DB) http://www.exploit-db.com/exploits/19482 - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c - Exploit, Patch (CONFIRM) http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c - Exploit, Patch, Vendor Advisory
CWE CWE-119 CWE-476
CPE cpe:2.3:a:gnu:gimp:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:gimp:gimp:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gimp:2.3.0:*:*:*:*:*:*:*

Information

Published : 2012-07-12 21:55

Updated : 2023-12-10 11:16


NVD link : CVE-2012-3236

Mitre link : CVE-2012-3236

CVE.ORG link : CVE-2012-3236


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-476

NULL Pointer Dereference