drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in GIMP
Name: |
Mehrere Probleme in GIMP |
|
ID: |
DSA-2426-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian squeeze |
|
Datum: |
Di, 6. März 2012, 22:44 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896 |
|
Applikationen: |
GIMP |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2426-1 security@debian.org http://www.debian.org/security/ Florian Weimer March 06, 2012 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : gimp Vulnerability : several Problem type : local Debian-specific: no CVE ID : CVE-2010-4540 CVE-2010-4541 CVE-2010-4542 CVE-2010-4543 CVE-2011-1782 CVE-2011-2896
Several vulnerabilities have been identified in GIMP, the GNU Image Manipulation Program.
CVE-2010-4540 Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS > LIGHT" plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.
CVE-2010-4541 Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.
CVE-2010-4542 Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in in the GFIG plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.
CVE-2010-4543 Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.
CVE-2011-1782 The correction for CVE-2010-4543 was incomplete.
CVE-2011-2896 The LZW decompressor in the LZWReadByte function in plug-ins/common/file-gif-load.c does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream.
For the stable distribution (squeeze), these problems have been fixed in version 2.6.10-1+squeeze3.
For the testing distribution (wheezy) and the unstable distribution (sid), these problems have been fixed in version 2.6.11-5.
We recommend that you upgrade your gimp packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJPVlM6AAoJEL97/wQC1SS+gDYH/j24PZB+ZC0nPXZUnc1y++I0 Kfvm2cCSKA1jK1g5OhWEKWkOlGn3W8blytT2gXtdYxLu3ySbb2SdTU8mKSoKcFjU rLuYFoyegORbtPf7vujCz8xy7LYNUUqSnJ9X0DSH2m1EcuvcSMunr5X0W2wxPMUS 5BqcKpBa1qN3NexAzEtnFmaSbjsC4C2w8L1YC+V4fNKTi5LDgYcsUthduv01v/LI zHGgPYdM7p5EJ+kzeWNsjJ9Y98R7QEtsIuGMRHGtjTzQiPVgkxEWlfuE8K0hxutu 812kVi1Ae1Ra/EtWxcNO136RCQonm7NY14Yk1iEzPuf6VUe+yn6jUCbUunZN6wc= =fKIu -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/87fwdla7od.fsf@mid.deneb.enyo.de
|
|
|
|