Vulnerability Name:

CVE-2009-3909 (CCN-54304)

Assigned:2009-11-17
Published:2009-11-17
Updated:2022-02-07
Summary:Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.1 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.2 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-3909

Source: CONFIRM
Type: Patch, Vendor Advisory
http://git.gnome.org/cgit/gimp/commit/?id=0e440cb6d4d6ee029667363d244aff61b154c33c

Source: CCN
Type: GNOME GIT Repository
Harden the PSD plugin against integer overflows.

Source: CONFIRM
Type: Patch, Vendor Advisory
http://git.gnome.org/cgit/gimp/commit/?id=9cc8d78ff33b7a36852b74e64b427489cad44d0e

Source: SUSE
Type: Third Party Advisory
SUSE-SR:2010:009

Source: OSVDB
Type: Broken Link
60178

Source: CCN
Type: RHSA-2012-1181
Moderate: gimp security update

Source: REDHAT
Type: Third Party Advisory
RHSA-2012:1181

Source: CCN
Type: SA37348
Gimp PSD Image Parsing Integer Overflow Vulnerability

Source: SECUNIA
Type: Broken Link
37348

Source: SECUNIA
Type: Broken Link
50737

Source: CCN
Type: Secunia Research 17/11/2009
Gimp PSD Image Parsing Integer Overflow Vulnerability

Source: MISC
Type: Broken Link
http://secunia.com/secunia_research/2009-43/

Source: GENTOO
Type: Third Party Advisory
GLSA-201209-23

Source: DEBIAN
Type: Third Party Advisory
DSA-1941

Source: DEBIAN
Type: DSA-1941
poppler -- several vulnerabilities

Source: MANDRIVA
Type: Broken Link
MDVSA-2009:332

Source: CCN
Type: OSVDB ID: 60178
GIMP plug-ins/file-psd/psd-load.c read_channel_data() Function PSD Image Handling Overflow

Source: BUGTRAQ
Type: Broken Link, Third Party Advisory, VDB Entry
20091117 Secunia Research: Gimp PSD Image Parsing Integer Overflow Vulnerability

Source: BID
Type: Broken Link, Third Party Advisory, VDB Entry
37040

Source: CCN
Type: BID-37040
GIMP PSD Image Parsing Integer Overflow Vulnerability

Source: CCN
Type: USN-880-1
GIMP vulnerabilities

Source: VUPEN
Type: Broken Link, Vendor Advisory
ADV-2009-3270

Source: VUPEN
Type: Broken Link
ADV-2010-1021

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.gnome.org/show_bug.cgi?id=600741

Source: XF
Type: UNKNOWN
gimp-readchanneldata-bo(54304)

Source: SUSE
Type: SUSE-SR:2010:009
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gimp:gimp:2.6.7:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gimp:gimp:2.6.7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20093909
    V
    CVE-2009-3909
    2017-09-27
    oval:org.mitre.oval:def:13677
    P
    USN-880-1 -- gimp vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13692
    P
    DSA-1941-1 poppler -- several
    2014-06-23
    oval:org.mitre.oval:def:7365
    P
    DSA-1941 poppler -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:23104
    P
    ELSA-2012:1181: gimp security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:20952
    P
    RHSA-2012:1181: gimp security update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20121181
    P
    RHSA-2012:1181: gimp security update (Moderate)
    2012-08-20
    oval:org.debian:def:1941
    V
    several vulnerabilities
    2009-11-25
    BACK
    gimp gimp 2.6.7
    gimp gimp 2.6.7
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 5
    canonical ubuntu 8.04
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva linux 2010
    mandriva linux 2010