Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 20 Aug 2012 14:52:43 +0200
From: Matthias Weckbecker <mweckbecker@...e.de>
To: oss-security@...ts.openwall.com
Subject: The Gimp GIF plug-in CVE-2012-3481 issue

Hi,

so here is the 3rd one:

specially crafted GIF image files could cause a heap-based buffer overflow via 
an integer overflow of the 'height' / 'len' properties of the file.
Attackers could exploit this to cause a Denial of Service (Application crash)
or to (potentially) execute arbitrary code in the context of the user running 
gimp.

Reference(s):
https://bugzilla.novell.com/show_bug.cgi?id=776572

Thanks to Jan Lieskovsky and Florian Weimer for joining me in researching this
flaw.

Matthias

-- 
Matthias Weckbecker, Senior Security Engineer, SUSE Security Team
SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany
Tel: +49-911-74053-0;  http://suse.com/
SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg) 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ