Vulnerability Name: | CVE-2006-3404 (CCN-27687) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2006-07-06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2006-07-06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-02-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MISC Type: Third Party Advisory http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=377049 Source: CCN Type: Gnome Bug 346742 Buffer overrun in XCF parsing code (GIMP) Source: CONFIRM Type: Issue Tracking, Third Party Advisory http://bugzilla.gnome.org/show_bug.cgi?id=346742 Source: MITRE Type: CNA CVE-2006-3404 Source: CCN Type: RHSA-2006-0598 gimp security update Source: CCN Type: SA20976 Gimp XCF Parsing Buffer Overflow Vulnerability Source: SECUNIA Type: Broken Link 20976 Source: SECUNIA Type: Broken Link 20979 Source: SECUNIA Type: Broken Link 21069 Source: SECUNIA Type: Broken Link 21104 Source: SECUNIA Type: Broken Link 21170 Source: SECUNIA Type: Broken Link 21182 Source: SECUNIA Type: Broken Link 21198 Source: SECUNIA Type: Broken Link 21459 Source: CCN Type: SA23044 Sun Solaris Gimp XCF Parsing Buffer Overflow Vulnerability Source: SECUNIA Type: Broken Link 23044 Source: GENTOO Type: Third Party Advisory GLSA-200607-08 Source: CCN Type: SECTRACK ID: 1016527 GIMP Buffer Overflow in xcf_load_vector() Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Broken Link, Third Party Advisory, VDB Entry 1016527 Source: CCN Type: Sun Alert ID: 102720 Security Vulnerability in GIMP(1) May Lead to Denial of Service (DoS) or Execution of Arbitrary Code Source: SUNALERT Type: Broken Link 102720 Source: SUNALERT Type: Broken Link 200070 Source: CCN Type: ASA-2006-144 gimp security update (RHSA-2006-0598) Source: CCN Type: ASA-2006-257 Security Vulnerability in GIMP(1) May Lead to Denial of Service (DoS) or Execution of Arbitrary Code (SUN 102720) Source: DEBIAN Type: Third Party Advisory DSA-1116 Source: DEBIAN Type: DSA-1116 gimp -- buffer overflow Source: CCN Type: GLSA-200607-08 GIMP: Buffer overflow Source: CCN Type: GIMP Web site GIMP - Downloads Source: MANDRIVA Type: Broken Link MDKSA-2006:127 Source: SUSE Type: Broken Link SUSE-SR:2006:019 Source: OSVDB Type: Broken Link 27037 Source: CCN Type: OSVDB ID: 27037 GIMP XCF Parsing xcf_load_vector() Function Overflow Source: REDHAT Type: Broken Link RHSA-2006:0598 Source: BUGTRAQ Type: Broken Link, Third Party Advisory, VDB Entry 20060724 Re: [ GLSA 200607-08 ] GIMP: Buffer overflow Source: BUGTRAQ Type: Broken Link, Third Party Advisory, VDB Entry 20060724 ERRATA: [ GLSA 200607-08 ] GIMP: Buffer overflow Source: BUGTRAQ Type: Broken Link, Third Party Advisory, VDB Entry 20060724 rPSA-2006-0135-1 gimp Source: BID Type: Broken Link, Patch, Third Party Advisory, VDB Entry 18877 Source: CCN Type: BID-18877 Gimp XCF_load_vector Function Buffer Overflow Vulnerability Source: CCN Type: USN-312-1 Gimp vulnerability Source: UBUNTU Type: Third Party Advisory USN-312-1 Source: VUPEN Type: Broken Link ADV-2006-2703 Source: VUPEN Type: Broken Link ADV-2006-4634 Source: XF Type: Third Party Advisory, VDB Entry gimp-xcfloadvector-bo(27687) Source: XF Type: UNKNOWN gimp-xcfloadvector-bo(27687) Source: CONFIRM Type: Broken Link https://issues.rpath.com/browse/RPL-522 Source: OVAL Type: Tool Signature oval:org.mitre.oval:def:11259 Source: OVAL Type: Tool Signature oval:org.mitre.oval:def:5908 Source: SUSE Type: SUSE-SR:2006:019 SUSE Security Summary Report | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |