Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in GIMP
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in GIMP
ID: USN-1659-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10
Datum: Mo, 10. Dezember 2012, 18:57
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576
Applikationen: GIMP

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============0121183346563118777==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig2B1C2F177C6D768E8C308377"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig2B1C2F177C6D768E8C308377
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1659-1
December 10, 2012

gimp vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS

Summary:

GIMP could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
- gimp: The GNU Image Manipulation Program

Details:

It was discovered that GIMP incorrectly handled malformed XWD files. If a
user were tricked into opening a specially crafted XWD file, an attacker
could cause GIMP to crash, or possibly execute arbitrary code with the
user's privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
gimp 2.8.2-1ubuntu1.1

Ubuntu 12.04 LTS:
gimp 2.6.12-1ubuntu1.2

Ubuntu 11.10:
gimp 2.6.11-2ubuntu4.2

Ubuntu 10.04 LTS:
gimp 2.6.8-2ubuntu1.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1659-1
CVE-2012-5576

Package Information:
https://launchpad.net/ubuntu/+source/gimp/2.8.2-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gimp/2.6.12-1ubuntu1.2
https://launchpad.net/ubuntu/+source/gimp/2.6.11-2ubuntu4.2
https://launchpad.net/ubuntu/+source/gimp/2.6.8-2ubuntu1.6



--------------enig2B1C2F177C6D768E8C308377
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=U7lV
-----END PGP SIGNATURE-----

--------------enig2B1C2F177C6D768E8C308377--


--===============0121183346563118777==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0121183346563118777==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung