CVE-2012-5576

Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

History

13 Feb 2023, 04:37

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=879302', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=879302', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2013:1778', 'name': 'https://access.redhat.com/errata/RHSA-2013:1778', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2012-5576', 'name': 'https://access.redhat.com/security/cve/CVE-2012-5576', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2012-5576 gimp (XWD plug-in): Stack-based buffer overflow when loading XWD file Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.

02 Feb 2023, 18:16

Type Values Removed Values Added
References
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=879302 -
  • (MISC) https://access.redhat.com/errata/RHSA-2013:1778 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2012-5576 -
Summary Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file. CVE-2012-5576 gimp (XWD plug-in): Stack-based buffer overflow when loading XWD file

07 Feb 2022, 19:10

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/50296 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/50296 - Broken Link
References (SECUNIA) http://secunia.com/advisories/51479 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/51479 - Broken Link
References (MLIST) http://www.openwall.com/lists/oss-security/2012/11/27/1 - (MLIST) http://www.openwall.com/lists/oss-security/2012/11/27/1 - Mailing List, Third Party Advisory
References (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 - Patch (CONFIRM) http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 - Patch, Vendor Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1659-1 - Patch (UBUNTU) http://www.ubuntu.com/usn/USN-1659-1 - Patch, Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 - Broken Link
References (SECUNIA) http://secunia.com/advisories/51528 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/51528 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/56647 - (BID) http://www.securityfocus.com/bid/56647 - Third Party Advisory, VDB Entry
References (CONFIRM) https://bugzilla.gnome.org/show_bug.cgi?id=687392 - Exploit, Patch (CONFIRM) https://bugzilla.gnome.org/show_bug.cgi?id=687392 - Exploit, Issue Tracking, Patch, Third Party Advisory
CWE CWE-119 CWE-787
CPE cpe:2.3:a:gimp:gimp:2.8.2:*:*:*:*:*:*:* cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*

Information

Published : 2012-12-18 01:55

Updated : 2023-12-10 11:16


NVD link : CVE-2012-5576

Mitre link : CVE-2012-5576

CVE.ORG link : CVE-2012-5576


JSON object : View

Products Affected

gimp

  • gimp
CWE
CWE-787

Out-of-bounds Write