Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce
https://bugzilla.redhat.com/show_bug.cgi?id=689831
http://securitytracker.com/id?1025586
http://www.securityfocus.com/bid/48057
http://www.mandriva.com/security/advisories?name=MDVSA-2011:110
http://www.redhat.com/support/errata/RHSA-2011-0838.html
http://www.redhat.com/support/errata/RHSA-2011-0837.html
http://secunia.com/advisories/50737