Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-1778.html | Third Party Advisory Vendor Advisory |
http://www.debian.org/security/2013/dsa-2813 | Third Party Advisory |
http://www.securityfocus.com/bid/64105 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2051-1 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=947868 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/201603-01 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2013-12-12 18:55
Updated : 2023-02-13 04:41
NVD link : CVE-2013-1913
Mitre link : CVE-2013-1913
CVE.ORG link : CVE-2013-1913
JSON object : View
Products Affected
gimp
- gimp
redhat
- enterprise_linux
gnome
- glib
CWE
CWE-190
Integer Overflow or Wraparound