Vulnerability Name:

CVE-2009-1570 (CCN-54254)

Assigned:2009-11-12
Published:2009-11-12
Updated:2022-02-07
Summary:Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.1 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.3 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-1570

Source: CONFIRM
Type: Patch, Vendor Advisory
http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe

Source: CCN
Type: GNOME GIT Repository
GNOME source code

Source: SUSE
Type: Third Party Advisory
SUSE-SR:2010:009

Source: CCN
Type: RHSA-2011-0837
Moderate: gimp security update

Source: CCN
Type: RHSA-2011-0838
Moderate: gimp security update

Source: CCN
Type: SA37232
Gimp BMP Image Parsing Integer Overflow Vulnerability

Source: SECUNIA
Type: Broken Link
37232

Source: CCN
Type: SA37797
Sun Solaris Gimp BMP Image Parsing Integer Overflow Vulnerability

Source: SECUNIA
Type: Broken Link
50737

Source: CCN
Type: Secunia Research 12/11/2009
Gimp BMP Image Parsing Integer Overflow Vulnerability

Source: MISC
Type: Broken Link
http://secunia.com/secunia_research/2009-42/

Source: GENTOO
Type: Third Party Advisory
GLSA-201209-23

Source: CCN
Type: Sun Alert ID: 274390
An Integer Overflow Vulnerability in GIMP(1) May Lead to Denial of Service (DoS) or Execution of Arbitrary Code

Source: CCN
Type: GIMP Web site
GIMP - The GNU Image Manipulation Program

Source: OSVDB
Type: Broken Link
59930

Source: CCN
Type: OSVDB ID: 59930
GIMP plug-ins/file-bmp/bmp-read.c ReadImage() Function Overflow

Source: REDHAT
Type: Broken Link
RHSA-2011:0837

Source: REDHAT
Type: Broken Link
RHSA-2011:0838

Source: BUGTRAQ
Type: Broken Link, Third Party Advisory, VDB Entry
20091112 Secunia Research: Gimp BMP Image Parsing Integer Overflow Vulnerability

Source: BID
Type: Broken Link, Third Party Advisory, VDB Entry
37006

Source: CCN
Type: BID-37006
GIMP BMP Image Parsing Integer Overflow Vulnerability

Source: CCN
Type: USN-880-1
GIMP vulnerabilities

Source: VUPEN
Type: Broken Link, Patch
ADV-2009-3228

Source: VUPEN
Type: Broken Link
ADV-2009-3564

Source: VUPEN
Type: Broken Link
ADV-2010-1021

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.gnome.org/show_bug.cgi?id=600484

Source: XF
Type: Third Party Advisory, VDB Entry
gimp-readimage-bo(54254)

Source: XF
Type: UNKNOWN
gimp-readimage-bo(54254)

Source: OVAL
Type: Tool Signature
oval:org.mitre.oval:def:8290

Source: SUSE
Type: SUSE-SR:2010:009
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gimp:gimp:2.6.7:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gimp:gimp:2.6.7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_89::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_89::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_95::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_95::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_88::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_88::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_87::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_87::sparc:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_91::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_91::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_90::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_90::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_92::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_92::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_93::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_94::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_99::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_98::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_97::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_96::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_94::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_93::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_99::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_97::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_98::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_96::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_110::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_110::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_111::sparc:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_111::x86:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:5.6.z::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:26164
    P
    Security update for MozillaFirefox (Important)
    2021-11-17
    oval:org.opensuse.security:def:20091570
    V
    CVE-2009-1570
    2021-08-15
    oval:org.opensuse.security:def:36411
    P
    gimp-2.6.2-3.34.45.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26036
    P
    Security update for MozillaFirefox (Important)
    2021-04-27
    oval:org.opensuse.security:def:25972
    P
    Security update for postgresql12 (Important)
    2020-12-04
    oval:org.opensuse.security:def:27374
    P
    bind-devel-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26386
    P
    Security update for kdepim, messagelib (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25960
    P
    Security update for gimp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26678
    P
    coolkey on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27409
    P
    gimp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26537
    P
    dhcp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25961
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26692
    P
    evince on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26245
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26590
    P
    libmusicbrainz4 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26736
    P
    libQtWebKit4-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26302
    P
    Security update for python-PyYAML (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26639
    P
    star on GA media (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:13677
    P
    USN-880-1 -- gimp vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:23268
    P
    ELSA-2011:0838: gimp security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21710
    P
    RHSA-2011:0838: gimp security update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20110837
    P
    RHSA-2011:0837: gimp security update (Moderate)
    2011-05-31
    oval:com.redhat.rhsa:def:20110838
    P
    RHSA-2011:0838: gimp security update (Moderate)
    2011-05-31
    oval:org.mitre.oval:def:8290
    V
    An Integer Overflow Vulnerability in GIMP(1) May Lead to Denial of Service (DoS) or Execution of Arbitrary Code
    2010-03-01
    BACK
    gimp gimp 2.6.7
    gimp gimp 2.6.7
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    sun solaris 10
    sun solaris 10
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    canonical ubuntu 8.04
    sun opensolaris build_snv_89
    sun opensolaris build_snv_89
    sun opensolaris build_snv_95
    sun opensolaris build_snv_95
    sun opensolaris build_snv_88
    sun opensolaris build_snv_88
    sun opensolaris build_snv_87
    sun opensolaris build_snv_87
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    sun opensolaris build_snv_91
    sun opensolaris build_snv_91
    sun opensolaris build_snv_90
    sun opensolaris build_snv_90
    sun opensolaris build_snv_92
    sun opensolaris build_snv_92
    sun opensolaris build_snv_93
    sun opensolaris build_snv_94
    sun opensolaris build_snv_99
    sun opensolaris build_snv_98
    sun opensolaris build_snv_97
    sun opensolaris build_snv_96
    sun opensolaris build_snv_94
    sun opensolaris build_snv_93
    sun opensolaris build_snv_99
    sun opensolaris build_snv_97
    sun opensolaris build_snv_98
    sun opensolaris build_snv_96
    sun opensolaris build_snv_110
    sun opensolaris build_snv_110
    sun opensolaris build_snv_111
    sun opensolaris build_snv_111
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux eus 5.6.z
    redhat enterprise linux long life 5.6