Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-10920

Опубликовано: 29 окт. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27684.

A remote code execution (RCE) vulnerability exists in GIMP due to improper bounds checking during the parsing of ICNS image files. When a user opens a specially crafted ICNS file, it can trigger an out-of-bounds write, allowing attackers to execute arbitrary code within the context of the GIMP process.

Отчет

This vulnerability is rated Important rather than Moderate because it enables arbitrary code execution through a memory corruption flaw in the ICNS file parser. Although exploitation requires user interaction, the underlying issue—an out-of-bounds write—directly affects memory integrity and can allow attackers to gain control of program execution. The potential for full compromise of the application process elevates its impact beyond data exposure or denial-of-service, making it a significant security concern.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gimpOut of support scope
Red Hat Enterprise Linux 7gimpNot affected
Red Hat Enterprise Linux 8gimpFixedRHSA-2025:2241701.12.2025
Red Hat Enterprise Linux 9gimpFixedRHSA-2025:2196824.11.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2407191gimp: GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

EPSS

Процентиль: 18%
0.00056
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
5 месяцев назад

GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27684.

CVSS3: 7.8
nvd
5 месяцев назад

GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27684.

CVSS3: 7.8
debian
5 месяцев назад

GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulne ...

CVSS3: 7.8
github
5 месяцев назад

GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27684.

CVSS3: 7.8
fstec
7 месяцев назад

Уязвимость библиотеки для обработки изображений Gimp, связанная с записью за границами буфера, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 18%
0.00056
Низкий

7.8 High

CVSS3