Mandriva Linux Security Advisory : gimp (MDVSA-2011:167)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The remote Mandriva Linux host is missing one or more security

Description :

A vulnerability has been discovered and corrected in gimp :

The LZW decompressor in the LWZReadByte function in giftoppm.c in the
David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw
function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte
function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and
earlier, the LZWReadByte function in img/gifread.c in XPCE in
SWI-Prolog 5.10.4 and earlier, and other products, does not properly
handle code words that are absent from the decompression table when
encountered, which allows remote attackers to trigger an infinite loop
or a heap-based buffer overflow, and possibly execute arbitrary code,
via a crafted compressed stream, a related issue to CVE-2006-1168 and
CVE-2011-2895 (CVE-2011-2896).

The updated packages have been patched to correct these issues.

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.1
CVSS Temporal Score : 4.4
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 56726 ()

Bugtraq ID: 49148

CVE ID: CVE-2011-2896

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now