Page 3 of 42 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image. En GIMP 2.8.22, existe una sobrelectura de búfer basada en memoria dinámica (heap) en ReadImage en plug-ins/common/file-tga.c (relacionado con bgr2rgb.part.1) mediante un valor bits-per-pixel no esperado para una imagen RGBA. • http://www.openwall.com/lists/oss-security/2017/12/19/5 http://www.securityfocus.com/bid/102765 https://bugzilla.gnome.org/show_bug.cgi?id=739134 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. En GIMP 2.8.22, existe una sobrelectura de búfer basada en memoria dinámica (heap) en read_creator_block en plug-ins/common/file-psp.c. • http://www.openwall.com/lists/oss-security/2017/12/19/5 https://bugzilla.gnome.org/show_bug.cgi?id=790853 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string. En GIMP 2.8.22, existe una sobrelectura de búfer basada en pila en xcf_load_stream en app/xcf/xcf.c cuando no hay un carácter "\0" después de la cadena version. • http://www.openwall.com/lists/oss-security/2017/12/19/5 https://bugzilla.gnome.org/show_bug.cgi?id=790783 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

In GIMP 2.8.22, there is a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c. En GIMP 2.8.22, existe un desbordamiento de búfer basado en memoria dinámica (heap) en read_channel_data en plug-ins/common/file-psp.c. • http://www.openwall.com/lists/oss-security/2017/12/19/5 http://www.securityfocus.com/bid/102898 https://bugzilla.gnome.org/show_bug.cgi?id=790849 https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html https://usn.ubuntu.com/3539-1 https://www.debian.org/security/2017/dsa-4077 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 0

Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file. Vulnerabilidad de uso después de liberación de memoria en la función xcf_load_image en app/xcf/xcf-load.c en GIMP permite a atacantes remotos provocar una denegación de servicio (caída de programa) o posiblemente ejecutar código arbitrario a través de un archivo XCF manipulado. Multiple use-after-free vulnerabilities were found in GIMP in the channel and layer properties parsing process when loading XCF files. An attacker could create a specially crafted XCF file which could cause GIMP to crash. • http://lists.opensuse.org/opensuse-updates/2016-07/msg00005.html http://rhn.redhat.com/errata/RHSA-2016-2589.html http://www.debian.org/security/2016/dsa-3612 http://www.securityfocus.com/bid/91425 http://www.securitytracker.com/id/1036226 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.431987 http://www.ubuntu.com/usn/USN-3025-1 https://bugzilla.gnome.org/show_bug.cgi?id=767873 https://git.gnome.org/browse/gimp/commit/? • CWE-416: Use After Free •