Vulnerability Name: | CVE-2009-3909 (CCN-54304) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2009-11-17 | ||||||||||||||||||||||||||||||||||||
Published: | 2009-11-17 | ||||||||||||||||||||||||||||||||||||
Updated: | 2022-02-07 | ||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.1 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
5.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
5.2 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2009-3909 Source: CONFIRM Type: Patch, Vendor Advisory http://git.gnome.org/cgit/gimp/commit/?id=0e440cb6d4d6ee029667363d244aff61b154c33c Source: CCN Type: GNOME GIT Repository Harden the PSD plugin against integer overflows. Source: CONFIRM Type: Patch, Vendor Advisory http://git.gnome.org/cgit/gimp/commit/?id=9cc8d78ff33b7a36852b74e64b427489cad44d0e Source: SUSE Type: Third Party Advisory SUSE-SR:2010:009 Source: OSVDB Type: Broken Link 60178 Source: CCN Type: RHSA-2012-1181 Moderate: gimp security update Source: REDHAT Type: Third Party Advisory RHSA-2012:1181 Source: CCN Type: SA37348 Gimp PSD Image Parsing Integer Overflow Vulnerability Source: SECUNIA Type: Broken Link 37348 Source: SECUNIA Type: Broken Link 50737 Source: CCN Type: Secunia Research 17/11/2009 Gimp PSD Image Parsing Integer Overflow Vulnerability Source: MISC Type: Broken Link http://secunia.com/secunia_research/2009-43/ Source: GENTOO Type: Third Party Advisory GLSA-201209-23 Source: DEBIAN Type: Third Party Advisory DSA-1941 Source: DEBIAN Type: DSA-1941 poppler -- several vulnerabilities Source: MANDRIVA Type: Broken Link MDVSA-2009:332 Source: CCN Type: OSVDB ID: 60178 GIMP plug-ins/file-psd/psd-load.c read_channel_data() Function PSD Image Handling Overflow Source: BUGTRAQ Type: Broken Link, Third Party Advisory, VDB Entry 20091117 Secunia Research: Gimp PSD Image Parsing Integer Overflow Vulnerability Source: BID Type: Broken Link, Third Party Advisory, VDB Entry 37040 Source: CCN Type: BID-37040 GIMP PSD Image Parsing Integer Overflow Vulnerability Source: CCN Type: USN-880-1 GIMP vulnerabilities Source: VUPEN Type: Broken Link, Vendor Advisory ADV-2009-3270 Source: VUPEN Type: Broken Link ADV-2010-1021 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.gnome.org/show_bug.cgi?id=600741 Source: XF Type: UNKNOWN gimp-readchanneldata-bo(54304) Source: SUSE Type: SUSE-SR:2010:009 SUSE Security Summary Report | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |