Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-14422

Опубликовано: 23 дек. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.

A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability during the parsing of a malicious PNM (Portable Anymap) image file. This issue stems from insufficient validation of user-supplied data, which can lead to an integer overflow before memory allocation. Successful exploitation requires user interaction, such as opening a specially crafted file, and could result in arbitrary code execution within the context of the current process.

Отчет

This vulnerability is rated Important for Red Hat products as it allows remote code execution in GIMP through an integer overflow when parsing a malicious PNM image file. Exploitation requires user interaction, specifically opening a specially crafted PNM file.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users should exercise caution when opening untrusted PNM image files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gimpOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportgimpFixedRHSA-2026:159029.01.2026
Red Hat Enterprise Linux 8gimpFixedRHSA-2026:157429.01.2026
Red Hat Enterprise Linux 8.2 Advanced Update SupportgimpFixedRHSA-2026:159129.01.2026
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportgimpFixedRHSA-2026:158929.01.2026
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OngimpFixedRHSA-2026:158929.01.2026
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportgimpFixedRHSA-2026:158829.01.2026
Red Hat Enterprise Linux 8.6 Telecommunications Update ServicegimpFixedRHSA-2026:158829.01.2026
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsgimpFixedRHSA-2026:158829.01.2026
Red Hat Enterprise Linux 8.8 Telecommunications Update ServicegimpFixedRHSA-2026:158429.01.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=2424766gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow

EPSS

Процентиль: 30%
0.00115
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.

CVSS3: 7.8
nvd
4 месяца назад

GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.

CVSS3: 7.8
debian
4 месяца назад

GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerabi ...

redos
около 1 месяца назад

Уязвимость gimp

rocky
2 месяца назад

Important: gimp:2.8 security update

EPSS

Процентиль: 30%
0.00115
Низкий

7.8 High

CVSS3