Get a Pentest and security assessment of your IT network.

Advisories

Gimp PSD Image Parsing Integer Overflow

Secunia Research has discovered a vulnerability in Gimp, which can be exploited by malicious people to potentially compromise a user’s system. The vulnerability is caused by an integer overflow error within the “read_channel_data()” function in plug-ins/file-psd/psd-load.c. This can be exploited to cause a heap-based buffer overflow by e.g. tricking a user into opening a specially crafted PSD file. Version 2.6.7 is affected.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/82763/secunia-gimppsd.txt

Source: https://packetstormsecurity.com/files/82763/Gimp-PSD-Image-Parsing-Integer-Overflow.html

Related posts
Advisories

Secunia Security Advisory 35516

Advisories

Secunia Security Advisory 38533

Advisories

Secunia Security Advisory 41538

Advisories

CSIS2005-1.txt