Patching for Windows Mac Linux
CVE Vulnerabilities for Gimp
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2022‑32990 | 2022‑06‑24 14:15:08 | MEDIUM (6) | An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30 allows attackers to trigger an unhandled exception via a crafted XCF file, causing a Denial of Service (DoS). | 2 | 4 | LOCAL |
CVE‑2022‑30067 | 2022‑05‑17 17:15:08 | MEDIUM (6) | GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a crafted XCF file, the program will allocate for a huge amount of memory, resulting in insufficient memory or program crash. | 2 | 4 | LOCAL |
CVE‑2021‑45463 | 2021‑12‑23 06:15:07 | HIGH (8) | load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature. | 2 | 6 | LOCAL |
CVE‑2018‑12713 | 2018‑06‑24 22:29:00 | CRITICAL (9) | GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private. | 4 | 5 | NETWORK |
CVE‑2017‑17789 | 2017‑12‑20 09:29:01 | HIGH (8) | In GIMP 2.8.22, there is a heap-based buffer overflow in read_channel_data in plug-ins/common/file-psp.c. | 2 | 6 | LOCAL |
CVE‑2017‑17788 | 2017‑12‑20 09:29:01 | MEDIUM (6) | In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string. | 2 | 4 | LOCAL |
CVE‑2017‑17787 | 2017‑12‑20 09:29:01 | HIGH (8) | In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. | 2 | 6 | LOCAL |
CVE‑2017‑17786 | 2017‑12‑20 09:29:01 | HIGH (8) | In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image. | 2 | 6 | LOCAL |
CVE‑2017‑17785 | 2017‑12‑20 09:29:01 | HIGH (8) | In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c. | 2 | 6 | LOCAL |
CVE‑2017‑17784 | 2017‑12‑20 09:29:01 | HIGH (8) | In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data. | 2 | 6 | LOCAL |
CVE‑2016‑4994 | 2016‑07‑12 19:59:06 | HIGH (8) | Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file. | 2 | 6 | LOCAL |
CVE‑2013‑1978 | 2013‑12‑12 18:55:11 | MEDIUM (7) | Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries. | 0 | 0 | NETWORK |
CVE‑2013‑1913 | 2013‑12‑12 18:55:11 | MEDIUM (7) | Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump. | 0 | 0 | NETWORK |
CVE‑2012‑5576 | 2012‑12‑18 01:55:07 | HIGH (8) | Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file. | 0 | 0 | NETWORK |
CVE‑2012‑4245 | 2012‑08‑31 18:55:06 | MEDIUM (7) | The scriptfu network server in GIMP 2.6 does not require authentication, which allows remote attackers to execute arbitrary commands via the python-fu-eval command. | 0 | 0 | NETWORK |
CVE‑2012‑3481 | 2012‑08‑25 10:29:52 | MEDIUM (7) | Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information. | 0 | 0 | NETWORK |
CVE‑2012‑3403 | 2012‑08‑25 10:29:50 | MEDIUM (7) | Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted KiSS palette file, which triggers an "invalid free." | 0 | 0 | NETWORK |
CVE‑2012‑3402 | 2012‑08‑25 10:29:49 | MEDIUM (7) | Integer overflow in plug-ins/common/psd.c in the Adobe Photoshop PSD plugin in GIMP 2.2.13 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted channels header value in a PSD image file, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2009-3909. | 0 | 0 | NETWORK |
CVE‑2012‑3236 | 2012‑07‑12 21:55:07 | MEDIUM (4) | fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. | 0 | 0 | NETWORK |
CVE‑2012‑2763 | 2012‑07‑12 19:55:06 | HIGH (8) | Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server. | 0 | 0 | NETWORK |
CVE‑2011‑2896 | 2011‑08‑19 17:55:03 | MEDIUM (5) | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. | 0 | 0 | NETWORK |
CVE‑2011‑1782 | 2011‑07‑27 02:42:27 | HIGH (8) | Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4543. | 0 | 0 | NETWORK |
CVE‑2011‑1178 | 2011‑06‑06 19:55:01 | MEDIUM (7) | Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow. | 0 | 0 | NETWORK |
CVE‑2010‑4543 | 2011‑01‑07 20:00:05 | HIGH (8) | Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information. | 0 | 0 | NETWORK |
CVE‑2010‑4542 | 2011‑01‑07 20:00:05 | MEDIUM (7) | Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information. | 0 | 0 | NETWORK |
CVE‑2010‑4541 | 2011‑01‑07 20:00:05 | HIGH (9) | Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. | 0 | 0 | NETWORK |
CVE‑2010‑4540 | 2011‑01‑07 20:00:05 | MEDIUM (7) | Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS > LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information. | 0 | 0 | NETWORK |
What applications does Lavawall® monitor?
Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.