A heap-based buffer overflow flaw was found in the way Script-Fu plug-in of Gimp, a GNU Image Manipulation Program, processed certain arguments that have been provided to the TinyScheme console. A remote attacker could provide a specially-crafted Script-Fu script, which once processed by the plug-ins/script-fu executable could lead to script-fu executable crash, or, potentially arbitrary code execution with the privileges of the user running Gimp. References: [1] http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html [2] http://www.reactionpenetrationtesting.co.uk/advisories/scriptfubof.c
Acknowledgements: Red Hat would like to thank Joseph Sheridan of Reaction Information Security for reporting this issue.
Statement: The Red Hat Security Response Team has rated this issue as having low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.