|
Message-Id: <201208201452.43981.mweckbecker@suse.de> Date: Mon, 20 Aug 2012 14:52:43 +0200 From: Matthias Weckbecker <mweckbecker@...e.de> To: oss-security@...ts.openwall.com Subject: The Gimp GIF plug-in CVE-2012-3481 issue Hi, so here is the 3rd one: specially crafted GIF image files could cause a heap-based buffer overflow via an integer overflow of the 'height' / 'len' properties of the file. Attackers could exploit this to cause a Denial of Service (Application crash) or to (potentially) execute arbitrary code in the context of the user running gimp. Reference(s): https://bugzilla.novell.com/show_bug.cgi?id=776572 Thanks to Jan Lieskovsky and Florian Weimer for joining me in researching this flaw. Matthias -- Matthias Weckbecker, Senior Security Engineer, SUSE Security Team SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany Tel: +49-911-74053-0; http://suse.com/ SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.