Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-2272

Источник: debian
EPSS Низкий

Описание

[ICO import integer overflow bypass leads to heap buffer overflow]

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gimpfixed3.2.0~RC2-3.2package

Примечания

  • https://gitlab.gnome.org/GNOME/gimp/-/issues/15617

  • Fixed by: https://gitlab.gnome.org/GNOME/gimp/-/commit/058ada8f3ffc0a42b7dd1561a8817c8cc83b7d2a

EPSS

Процентиль: 18%
0.00058
Низкий

Связанные уязвимости

ubuntu
около 2 месяцев назад

[ICO import integer overflow bypass leads to heap buffer overflow]

CVSS3: 4.3
redhat
около 2 месяцев назад

A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service.

CVSS3: 4.3
github
4 дня назад

A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service.

suse-cvrf
около 1 месяца назад

Security update for gimp

EPSS

Процентиль: 18%
0.00058
Низкий