Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201208201452.43981.mweckbecker@suse.de>
Date: Mon, 20 Aug 2012 14:52:43 +0200
From: Matthias Weckbecker <mweckbecker@...e.de>
To: oss-security@...ts.openwall.com
Subject: The Gimp GIF plug-in CVE-2012-3481 issue

Hi,

so here is the 3rd one:

specially crafted GIF image files could cause a heap-based buffer overflow via 
an integer overflow of the 'height' / 'len' properties of the file.
Attackers could exploit this to cause a Denial of Service (Application crash)
or to (potentially) execute arbitrary code in the context of the user running 
gimp.

Reference(s):
https://bugzilla.novell.com/show_bug.cgi?id=776572

Thanks to Jan Lieskovsky and Florian Weimer for joining me in researching this
flaw.

Matthias

-- 
Matthias Weckbecker, Senior Security Engineer, SUSE Security Team
SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany
Tel: +49-911-74053-0;  http://suse.com/
SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg) 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.