Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.841246
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-1659-1)
Summary:The remote host is missing an update for the 'gimp' package(s) announced via the USN-1659-1 advisory.
Description:Summary:
The remote host is missing an update for the 'gimp' package(s) announced via the USN-1659-1 advisory.

Vulnerability Insight:
It was discovered that GIMP incorrectly handled malformed XWD files. If a
user were tricked into opening a specially crafted XWD file, an attacker
could cause GIMP to crash, or possibly execute arbitrary code with the
user's privileges.

Affected Software/OS:
'gimp' package(s) on Ubuntu 10.04, Ubuntu 11.10, Ubuntu 12.04, Ubuntu 12.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-5576
50296
http://secunia.com/advisories/50296
51479
http://secunia.com/advisories/51479
51528
http://secunia.com/advisories/51528
56647
http://www.securityfocus.com/bid/56647
MDVSA-2013:082
http://www.mandriva.com/security/advisories?name=MDVSA-2013:082
USN-1659-1
http://www.ubuntu.com/usn/USN-1659-1
[oss-security] 20121126 Re: CVE Request: Gimp memory corruption vulnerability
http://www.openwall.com/lists/oss-security/2012/11/27/1
http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1
https://bugzilla.gnome.org/show_bug.cgi?id=687392
openSUSE-SU-2012:1623
http://lists.opensuse.org/opensuse-updates/2012-12/msg00017.html
openSUSE-SU-2013:0123
http://lists.opensuse.org/opensuse-updates/2013-01/msg00014.html
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.