CVE-2006-4519 (GCVE-0-2006-4519)
Vulnerability from cvelistv5
Published
2007-07-10 18:00
Modified
2024-08-07 19:14
Severity ?
CWE
  • n/a
Summary
Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.
References
cve@mitre.org http://bugzilla.gnome.org/show_bug.cgi?id=451379 Issue Tracking, Third Party Advisory
cve@mitre.org http://developer.gimp.org/NEWS-2.2 Broken Link
cve@mitre.org http://issues.foresightlinux.org/browse/FL-457 Broken Link
cve@mitre.org http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551 Broken Link
cve@mitre.org http://osvdb.org/42139 Broken Link
cve@mitre.org http://osvdb.org/42140 Broken Link
cve@mitre.org http://osvdb.org/42141 Broken Link
cve@mitre.org http://osvdb.org/42142 Broken Link
cve@mitre.org http://osvdb.org/42143 Broken Link
cve@mitre.org http://osvdb.org/42144 Broken Link
cve@mitre.org http://osvdb.org/42145 Broken Link
cve@mitre.org http://secunia.com/advisories/26132 Broken Link
cve@mitre.org http://secunia.com/advisories/26215 Broken Link
cve@mitre.org http://secunia.com/advisories/26240 Broken Link
cve@mitre.org http://secunia.com/advisories/26575 Broken Link
cve@mitre.org http://secunia.com/advisories/26939 Broken Link
cve@mitre.org http://security.gentoo.org/glsa/glsa-200707-09.xml Third Party Advisory
cve@mitre.org http://www.debian.org/security/2007/dsa-1335 Third Party Advisory
cve@mitre.org http://www.mandriva.com/security/advisories?name=MDKSA-2007:170 Broken Link
cve@mitre.org http://www.redhat.com/support/errata/RHSA-2007-0513.html Third Party Advisory
cve@mitre.org http://www.securityfocus.com/archive/1/475257/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
cve@mitre.org http://www.securityfocus.com/bid/24835 Third Party Advisory, VDB Entry
cve@mitre.org http://www.securitytracker.com/id?1018349 Third Party Advisory, VDB Entry
cve@mitre.org http://www.ubuntu.com/usn/usn-494-1 Third Party Advisory
cve@mitre.org http://www.vupen.com/english/advisories/2007/2471 Broken Link
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/35308 Third Party Advisory, VDB Entry
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842 Tool Signature
af854a3a-2127-422b-91ae-364da2661108 http://bugzilla.gnome.org/show_bug.cgi?id=451379 Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://developer.gimp.org/NEWS-2.2 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://issues.foresightlinux.org/browse/FL-457 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42139 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42140 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42141 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42142 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42143 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42144 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/42145 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26132 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26215 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26240 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26575 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26939 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://security.gentoo.org/glsa/glsa-200707-09.xml Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2007/dsa-1335 Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.mandriva.com/security/advisories?name=MDKSA-2007:170 Broken Link
af854a3a-2127-422b-91ae-364da2661108 http://www.redhat.com/support/errata/RHSA-2007-0513.html Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/475257/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/24835 Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.securitytracker.com/id?1018349 Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/usn-494-1 Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2007/2471 Broken Link
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/35308 Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842 Tool Signature
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:14:47.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26132",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26132"
          },
          {
            "name": "ADV-2007-2471",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2471"
          },
          {
            "name": "20070801 FLEA-2007-0038-1 gimp",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/475257/100/0/threaded"
          },
          {
            "name": "gimp-plugins-code-execution(35308)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35308"
          },
          {
            "name": "42139",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42139"
          },
          {
            "name": "GLSA-200707-09",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200707-09.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:10842",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842"
          },
          {
            "name": "26240",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26240"
          },
          {
            "name": "26575",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26575"
          },
          {
            "name": "42140",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42140"
          },
          {
            "name": "USN-494-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-494-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugzilla.gnome.org/show_bug.cgi?id=451379"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://developer.gimp.org/NEWS-2.2"
          },
          {
            "name": "RHSA-2007:0513",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0513.html"
          },
          {
            "name": "20070709 Multiple Vendor GIMP Multiple Integer Overflow Vulnerabilities",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551"
          },
          {
            "name": "42143",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42143"
          },
          {
            "name": "42145",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42145"
          },
          {
            "name": "24835",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24835"
          },
          {
            "name": "26215",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26215"
          },
          {
            "name": "1018349",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018349"
          },
          {
            "name": "42144",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42144"
          },
          {
            "name": "MDKSA-2007:170",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:170"
          },
          {
            "name": "42141",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42141"
          },
          {
            "name": "DSA-1335",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1335"
          },
          {
            "name": "26939",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26939"
          },
          {
            "name": "42142",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42142"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://issues.foresightlinux.org/browse/FL-457"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26132",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26132"
        },
        {
          "name": "ADV-2007-2471",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2471"
        },
        {
          "name": "20070801 FLEA-2007-0038-1 gimp",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/475257/100/0/threaded"
        },
        {
          "name": "gimp-plugins-code-execution(35308)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35308"
        },
        {
          "name": "42139",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42139"
        },
        {
          "name": "GLSA-200707-09",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200707-09.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:10842",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842"
        },
        {
          "name": "26240",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26240"
        },
        {
          "name": "26575",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26575"
        },
        {
          "name": "42140",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42140"
        },
        {
          "name": "USN-494-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-494-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugzilla.gnome.org/show_bug.cgi?id=451379"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://developer.gimp.org/NEWS-2.2"
        },
        {
          "name": "RHSA-2007:0513",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0513.html"
        },
        {
          "name": "20070709 Multiple Vendor GIMP Multiple Integer Overflow Vulnerabilities",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551"
        },
        {
          "name": "42143",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42143"
        },
        {
          "name": "42145",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42145"
        },
        {
          "name": "24835",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24835"
        },
        {
          "name": "26215",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26215"
        },
        {
          "name": "1018349",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018349"
        },
        {
          "name": "42144",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42144"
        },
        {
          "name": "MDKSA-2007:170",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:170"
        },
        {
          "name": "42141",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42141"
        },
        {
          "name": "DSA-1335",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1335"
        },
        {
          "name": "26939",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26939"
        },
        {
          "name": "42142",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42142"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://issues.foresightlinux.org/browse/FL-457"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4519",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26132",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26132"
            },
            {
              "name": "ADV-2007-2471",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2471"
            },
            {
              "name": "20070801 FLEA-2007-0038-1 gimp",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/475257/100/0/threaded"
            },
            {
              "name": "gimp-plugins-code-execution(35308)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35308"
            },
            {
              "name": "42139",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42139"
            },
            {
              "name": "GLSA-200707-09",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200707-09.xml"
            },
            {
              "name": "oval:org.mitre.oval:def:10842",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842"
            },
            {
              "name": "26240",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26240"
            },
            {
              "name": "26575",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26575"
            },
            {
              "name": "42140",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42140"
            },
            {
              "name": "USN-494-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-494-1"
            },
            {
              "name": "http://bugzilla.gnome.org/show_bug.cgi?id=451379",
              "refsource": "CONFIRM",
              "url": "http://bugzilla.gnome.org/show_bug.cgi?id=451379"
            },
            {
              "name": "http://developer.gimp.org/NEWS-2.2",
              "refsource": "CONFIRM",
              "url": "http://developer.gimp.org/NEWS-2.2"
            },
            {
              "name": "RHSA-2007:0513",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0513.html"
            },
            {
              "name": "20070709 Multiple Vendor GIMP Multiple Integer Overflow Vulnerabilities",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551"
            },
            {
              "name": "42143",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42143"
            },
            {
              "name": "42145",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42145"
            },
            {
              "name": "24835",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24835"
            },
            {
              "name": "26215",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26215"
            },
            {
              "name": "1018349",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018349"
            },
            {
              "name": "42144",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42144"
            },
            {
              "name": "MDKSA-2007:170",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:170"
            },
            {
              "name": "42141",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42141"
            },
            {
              "name": "DSA-1335",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1335"
            },
            {
              "name": "26939",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26939"
            },
            {
              "name": "42142",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42142"
            },
            {
              "name": "http://issues.foresightlinux.org/browse/FL-457",
              "refsource": "CONFIRM",
              "url": "http://issues.foresightlinux.org/browse/FL-457"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4519",
    "datePublished": "2007-07-10T18:00:00",
    "dateReserved": "2006-08-31T00:00:00",
    "dateUpdated": "2024-08-07T19:14:47.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-4519\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-07-10T18:30:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer de entero en  la extensi\u00f3n del cargador de imagen en GIMP anterior a 2.2.16 permite a atacantes remotos con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de valores de longitud manipulados en archivos (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, y (7) XWD.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.16\",\"matchCriteriaId\":\"A3731BD9-F1B7-4DD0-8D56-96D16D0684D2\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.gnome.org/show_bug.cgi?id=451379\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://developer.gimp.org/NEWS-2.2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://issues.foresightlinux.org/browse/FL-457\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42139\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42140\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42141\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42142\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42143\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42144\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42145\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26132\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26215\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26240\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26575\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26939\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200707-09.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1335\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:170\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0513.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/475257/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/24835\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1018349\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-494-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35308\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842\",\"source\":\"cve@mitre.org\",\"tags\":[\"Tool Signature\"]},{\"url\":\"http://bugzilla.gnome.org/show_bug.cgi?id=451379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://developer.gimp.org/NEWS-2.2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://issues.foresightlinux.org/browse/FL-457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42140\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://osvdb.org/42145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26132\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26215\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200707-09.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1335\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:170\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0513.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/475257/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/24835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1018349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-494-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/35308\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Tool Signature\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…