Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7456-jpq8-24rh

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

EPSS

Процентиль: 89%
0.04723
Низкий

Дефекты

CWE-190

Связанные уязвимости

ubuntu
больше 15 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

redhat
почти 16 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

nvd
больше 15 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.

debian
больше 15 лет назад

Integer overflow in the read_channel_data function in plug-ins/file-ps ...

oracle-oval
почти 13 лет назад

ELSA-2012-1181: gimp security update (MODERATE)

EPSS

Процентиль: 89%
0.04723
Низкий

Дефекты

CWE-190