CVE-2017-17785
https://notcve.org/view.php?id=CVE-2017-17785
In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c. En GIMP 2.8.22, existe un desbordamiento de búfer basado en memoria dinámica (heap) en la función fli_read_brun en plug-ins/file-fli/fli.c. • http://www.openwall.com/lists/oss-security/2017/12/19/5 https://bugzilla.gnome.org/show_bug.cgi?id=739133 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-787: Out-of-bounds Write •
CVE-2017-17784
https://notcve.org/view.php?id=CVE-2017-17784
In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data. En GIMP 2.8.22, existe una sobrelectura de búfer basada en memoria dinámica (heap) en load_image en plug-ins/common/file-gbr.c en el analizador import gbr. Esto está relacionado con la gestión incorrecta de datos UTF-8. • http://www.openwall.com/lists/oss-security/2017/12/19/5 http://www.securityfocus.com/bid/102899 https://bugzilla.gnome.org/show_bug.cgi?id=790784 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •
CVE-2017-17788
https://notcve.org/view.php?id=CVE-2017-17788
In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string. En GIMP 2.8.22, existe una sobrelectura de búfer basada en pila en xcf_load_stream en app/xcf/xcf.c cuando no hay un carácter "\0" después de la cadena version. • http://www.openwall.com/lists/oss-security/2017/12/19/5 https://bugzilla.gnome.org/show_bug.cgi?id=790783 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •
CVE-2012-3236 – GIMP 2.8.0 - '.FIT' File Format Denial of Service
https://notcve.org/view.php?id=CVE-2012-3236
fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. fits-io.c en GIMP antes de v2.8.1 permite a atacantes remotos causar una denegación de servicio (desreferencia de puntero nulo y caída de la aplicación) a través de una cabecera XTENSION incorrecta de un archivo .fit, tal y como se demuestra mediante una cadena demasiado larga. • https://www.exploit-db.com/exploits/19482 http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html http://www.exploit-db.com/exploits/19482 http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html http://www.securityfocus.com/ • CWE-476: NULL Pointer Dereference •