Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122157
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2011-0838)
Summary:The remote host is missing an update for the 'gimp' package(s) announced via the ELSA-2011-0838 advisory.
Description:Summary:
The remote host is missing an update for the 'gimp' package(s) announced via the ELSA-2011-0838 advisory.

Vulnerability Insight:
[2:2.2.13-2.0.7.2]
- fix various overflows (#537356, #666793, #689831, #703403, #703405, #703407,
- unfuzz gimphelpmissing, icontheme patches

Affected Software/OS:
'gimp' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1570
BugTraq ID: 37006
http://www.securityfocus.com/bid/37006
Bugtraq: 20091112 Secunia Research: Gimp BMP Image Parsing Integer Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/507813/100/0/threaded
http://security.gentoo.org/glsa/glsa-201209-23.xml
http://secunia.com/secunia_research/2009-42/
https://bugzilla.gnome.org/show_bug.cgi?id=600484
http://www.osvdb.org/59930
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290
http://www.redhat.com/support/errata/RHSA-2011-0837.html
http://www.redhat.com/support/errata/RHSA-2011-0838.html
http://secunia.com/advisories/37232
http://secunia.com/advisories/50737
SuSE Security Announcement: SUSE-SR:2010:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
http://www.vupen.com/english/advisories/2009/3228
http://www.vupen.com/english/advisories/2009/3564
http://www.vupen.com/english/advisories/2010/1021
XForce ISS Database: gimp-readimage-bo(54254)
https://exchange.xforce.ibmcloud.com/vulnerabilities/54254
Common Vulnerability Exposure (CVE) ID: CVE-2010-4540
42771
http://secunia.com/advisories/42771
44750
http://secunia.com/advisories/44750
48236
http://secunia.com/advisories/48236
50737
70282
http://osvdb.org/70282
ADV-2011-0016
http://www.vupen.com/english/advisories/2011/0016
DSA-2426
http://www.debian.org/security/2012/dsa-2426
GLSA-201209-23
MDVSA-2011:103
http://www.mandriva.com/security/advisories?name=MDVSA-2011:103
RHSA-2011:0838
RHSA-2011:0839
http://www.redhat.com/support/errata/RHSA-2011-0839.html
SUSE-SR:2011:005
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
[oss-security] 20110103 CVE request for buffer overflows in gimp
http://openwall.com/lists/oss-security/2011/01/03/2
[oss-security] 20110104 Re: CVE request for buffer overflows in gimp
http://openwall.com/lists/oss-security/2011/01/04/7
gimp-lightning-effects-bo(64582)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64582
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497
https://bugzilla.redhat.com/show_bug.cgi?id=666793
Common Vulnerability Exposure (CVE) ID: CVE-2010-4541
70281
http://osvdb.org/70281
RHSA-2011:0837
gimp-sphere-designer-bo(64581)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64581
Common Vulnerability Exposure (CVE) ID: CVE-2010-4542
70283
http://osvdb.org/70283
Common Vulnerability Exposure (CVE) ID: CVE-2010-4543
70284
http://osvdb.org/70284
Common Vulnerability Exposure (CVE) ID: CVE-2011-1178
1025586
http://securitytracker.com/id?1025586
48057
http://www.securityfocus.com/bid/48057
MDVSA-2011:110
http://www.mandriva.com/security/advisories?name=MDVSA-2011:110
gimp-pcximage-bo(67787)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67787
http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce
https://bugzilla.redhat.com/show_bug.cgi?id=689831
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.