Gentoo Archives: gentoo-announce

From: Kristian Fiskerstrand <k_f@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201603-01 ] GIMP: Multiple vulnerabilities
Date: Sun, 06 Mar 2016 19:59:11
Message-Id: 56DC8D04.3060508@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201603-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: GIMP: Multiple vulnerabilities
9 Date: March 06, 2016
10 Bugs: #434582, #493372
11 ID: 201603-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 GIMP is vulnerable to multiple buffer overflows which could result in
19 the execution of arbitrary code or Denial of Service.
20
21 Background
22 ==========
23
24 GIMP is a cross-platform image editor available for GNU/Linux, OS X,
25 Windows and more operating systems.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 media-gfx/gimp < 2.8.0 >= 2.8.0
34
35 Description
36 ===========
37
38 GIMP's network server, scriptfu, is vulnerable to the remote execution
39 of arbitrary code via the python-fu-eval command due to not requiring
40 authentication. Additionally, the X Window Dump (XWD) plugin is
41 vulnerable to multiple buffer overflows possibly allowing the remote
42 execution of arbitrary code or Denial of Service. The XWD plugin is
43 vulnerable due to not validating large color entries.
44
45 Impact
46 ======
47
48 A remote attacker could possibly execute arbitrary code with the
49 privileges of the process due or perform a Denial of Service.
50
51 Workaround
52 ==========
53
54 There is no known work around at this time.
55
56 Resolution
57 ==========
58
59 All GIMP users should upgrade to the latest version:
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.8.0"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2012-4245
67 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4245
68 [ 2 ] CVE-2013-1913
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913
70 [ 3 ] CVE-2013-1978
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 https://security.gentoo.org/glsa/201603-01
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users' machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 https://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2016 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature