7.5
CVSSv2

CVE-2010-4543

Published: 07/01/2011 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image. NOTE: some of these details are obtained from third party information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gimp gimp 2.6.11

Vendor Advisories

Debian Bug report logs - #608497 gimp: four buffer overflows Package: gimp; Maintainer for gimp is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Source for gimp is src:gimp (PTS, buildd, popcon) Reported by: "non customers" <non-customers@operamailcom> Date: Fri, 31 Dec 2010 13:39:02 UTC ...
GIMP could be made to run programs as your login if it opened a specially crafted file ...
Several vulnerabilities have been identified in GIMP, the GNU Image Manipulation Program CVE-2010-4540 Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-uic in the LIGHTING EFFECTS & LIGHT plugin allows user-assisted remote attackers to cause a denial of service (application crash) or possibly ...

Exploits

source: wwwsecurityfocuscom/bid/45647/info GIMP is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate checks on user-supplied input Successfully exploiting these issues may allow remote attackers to execute arbitrary code in the context of the application Failed attacks will cause ...