Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-3909

Опубликовано: 19 нояб. 2009
Источник: debian
EPSS Низкий

Описание

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gimpfixed2.6.7-1.1package

Примечания

  • http://secunia.com/secunia_research/2009-43/

EPSS

Процентиль: 89%
0.04723
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

redhat
почти 16 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

nvd
больше 15 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

github
больше 3 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

oracle-oval
почти 13 лет назад

ELSA-2012-1181: gimp security update (MODERATE)

EPSS

Процентиль: 89%
0.04723
Низкий