Page 2 of 9 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. En GIMP 2.8.22, existe una sobrelectura de búfer basada en memoria dinámica (heap) en read_creator_block en plug-ins/common/file-psp.c. • http://www.openwall.com/lists/oss-security/2017/12/19/5 https://bugzilla.gnome.org/show_bug.cgi?id=790853 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string. En GIMP 2.8.22, existe una sobrelectura de búfer basada en pila en xcf_load_stream en app/xcf/xcf.c cuando no hay un carácter "\0" después de la cadena version. • http://www.openwall.com/lists/oss-security/2017/12/19/5 https://bugzilla.gnome.org/show_bug.cgi?id=790783 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

In GIMP 2.8.22, there is a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c. En GIMP 2.8.22, existe un desbordamiento de búfer basado en memoria dinámica (heap) en read_channel_data en plug-ins/common/file-psp.c. • http://www.openwall.com/lists/oss-security/2017/12/19/5 http://www.securityfocus.com/bid/102898 https://bugzilla.gnome.org/show_bug.cgi?id=790849 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-787: Out-of-bounds Write •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 5

fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. fits-io.c en GIMP antes de v2.8.1 permite a atacantes remotos causar una denegación de servicio (desreferencia de puntero nulo y caída de la aplicación) a través de una cabecera XTENSION incorrecta de un archivo .fit, tal y como se demuestra mediante una cadena demasiado larga. • https://www.exploit-db.com/exploits/19482 http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html http://www.exploit-db.com/exploits/19482 http://www.mandriva.com/security/advisories?name=MDVSA-2013:082 http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html http://www.securityfocus.com/ • CWE-476: NULL Pointer Dereference •