Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 20 Aug 2012 14:52:43 +0200
From: Matthias Weckbecker <>
Subject: The Gimp GIF plug-in CVE-2012-3481 issue


so here is the 3rd one:

specially crafted GIF image files could cause a heap-based buffer overflow via 
an integer overflow of the 'height' / 'len' properties of the file.
Attackers could exploit this to cause a Denial of Service (Application crash)
or to (potentially) execute arbitrary code in the context of the user running 


Thanks to Jan Lieskovsky and Florian Weimer for joining me in researching this


Matthias Weckbecker, Senior Security Engineer, SUSE Security Team
SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany
Tel: +49-911-74053-0;
SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg) 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ