5.1
CVSSv2

CVE-2006-3404

Published: 06/07/2006 Updated: 07/02/2022
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp prior to 2.2.12 allows user-assisted malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gimp gimp

Vendor Advisories

Debian Bug report logs - #377049 gimp: Buffer overrun in XCF reading code Package: gimp; Maintainer for gimp is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Source for gimp is src:gimp (PTS, buildd, popcon) Reported by: Henning Makholm <henning@makholmnet> Date: Thu, 6 Jul 2006 11:18:14 ...
Henning Makholm discovered that gimp did not sufficiently validate the ‘num_axes’ parameter in XCF files By tricking a user into opening a specially crafted XCF file with Gimp, an attacker could exploit this to execute arbitrary code with the user’s privileges ...

References

CWE-120http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=377049http://bugzilla.gnome.org/show_bug.cgi?id=346742http://www.ubuntu.com/usn/usn-312-1http://www.securityfocus.com/bid/18877http://www.osvdb.org/27037http://secunia.com/advisories/20976http://secunia.com/advisories/20979http://www.redhat.com/support/errata/RHSA-2006-0598.htmlhttp://securitytracker.com/id?1016527http://secunia.com/advisories/21069http://secunia.com/advisories/21104https://issues.rpath.com/browse/RPL-522http://www.debian.org/security/2006/dsa-1116http://security.gentoo.org/glsa/glsa-200607-08.xmlhttp://secunia.com/advisories/21170http://secunia.com/advisories/21182http://secunia.com/advisories/21198http://www.novell.com/linux/security/advisories/2006_19_sr.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102720-1http://secunia.com/advisories/23044http://secunia.com/advisories/21459http://www.mandriva.com/security/advisories?name=MDKSA-2006:127http://sunsolve.sun.com/search/document.do?assetkey=1-66-200070-1http://www.vupen.com/english/advisories/2006/2703http://www.vupen.com/english/advisories/2006/4634https://exchange.xforce.ibmcloud.com/vulnerabilities/27687https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5908https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11259http://www.securityfocus.com/archive/1/441030/100/0/threadedhttp://www.securityfocus.com/archive/1/441012/100/0/threadedhttp://www.securityfocus.com/archive/1/440987/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=377049https://usn.ubuntu.com/312-1/https://nvd.nist.gov