CVE-2010-4542

medium

Description

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

References

http://openwall.com/lists/oss-security/2011/01/04/7

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497

https://bugzilla.redhat.com/show_bug.cgi?id=666793

http://www.vupen.com/english/advisories/2011/0016

http://openwall.com/lists/oss-security/2011/01/03/2

http://osvdb.org/70283

http://secunia.com/advisories/42771

http://www.redhat.com/support/errata/RHSA-2011-0838.html

http://www.mandriva.com/security/advisories?name=MDVSA-2011:103

http://www.redhat.com/support/errata/RHSA-2011-0839.html

http://secunia.com/advisories/44750

http://secunia.com/advisories/50737

http://security.gentoo.org/glsa/glsa-201209-23.xml

http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html

http://secunia.com/advisories/48236

http://www.debian.org/security/2012/dsa-2426

Details

Source: MITRE

Published: 2011-01-07

Updated: 2022-02-07

Type: CWE-787

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM