Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-4542

Опубликовано: 07 янв. 2011
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8

Описание

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

2.6.11-1ubuntu6
hardy

released

2.4.5-1ubuntu2.3
karmic

released

2.6.7-1ubuntu1.2
lucid

released

2.6.8-2ubuntu1.2
maverick

released

2.6.10-1ubuntu3.2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 87%
0.03676
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

nvd
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

debian
больше 14 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb functi ...

github
около 3 лет назад

Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.

oracle-oval
около 14 лет назад

ELSA-2011-0839: gimp security update (MODERATE)

EPSS

Процентиль: 87%
0.03676
Низкий

6.8 Medium

CVSS2