CVE-2012-3481
plug-in): Heap-based buffer overflow by loading certain GIF images
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
Desbordamiento de entero en la función ReadImage en plug-ins/common/file-gif-load.c en el complemento de formato de imagen GIF de GIMP v2.8.x y anteriores permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) y, posiblemente, ejecutar código arbitrario a través de las propiedades height y len en un archivo de imagen GIF,lo que provoca un desbordamiento de búfer basado en memoria dinámica. NOTA: algunos de estos detalles han sido obtenidos a partir de información de terceros.
Multiple vulnerabilities have been found in GIMP, the worst of which allow execution of arbitrary code. Versions less than 2.8.2-r1 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-06-14 CVE Reserved
- 2012-08-25 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-122: Heap-based Buffer Overflow
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/50296 | Broken Link | |
http://www.openwall.com/lists/oss-security/2012/08/20/8 | Mailing List |
|
http://www.securityfocus.com/bid/55101 | Third Party Advisory | |
http://www.securitytracker.com/id?1027411 | Third Party Advisory | |
https://bugzilla.novell.com/show_bug.cgi?id=776572 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|