Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2023-44444: ELSA-2024-0675: gimp security update (IMPORTANT) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2023-44444: ELSA-2024-0675: gimp security update (IMPORTANT) (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
11/14/2023
Created
05/22/2024
Added
05/21/2024
Modified
07/22/2024

Description

GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22097. A parsing vulnerability was found in the GNU Image Manipulation Program (GIMP). This flaw allows an unauthenticated, remote attacker to trick a GIMP user into opening a malicious PSP file, possibly enabling the execution of unauthorized code within the GIMP process.

Solution(s)

  • oracle-linux-upgrade-ernel-uek-is-earlier-than-0-5-4-17-21
  • oracle-linux-upgrade-gimp
  • oracle-linux-upgrade-gimp-devel
  • oracle-linux-upgrade-gimp-devel-tools
  • oracle-linux-upgrade-gimp-libs
  • oracle-linux-upgrade-kernel-uek-debug
  • oracle-linux-upgrade-pygobject2
  • oracle-linux-upgrade-pygobject2-codegen
  • oracle-linux-upgrade-pygobject2-devel
  • oracle-linux-upgrade-pygobject2-doc
  • oracle-linux-upgrade-pygtk2
  • oracle-linux-upgrade-pygtk2-codegen
  • oracle-linux-upgrade-pygtk2-devel
  • oracle-linux-upgrade-pygtk2-doc
  • oracle-linux-upgrade-python2-cairo
  • oracle-linux-upgrade-python2-cairo-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;