Bug 838941 (CVE-2012-3402) - CVE-2012-3402 gimp (PSD plug-in): Heap-buffer overflow by decoding certain PSD headers
Summary: CVE-2012-3402 gimp (PSD plug-in): Heap-buffer overflow by decoding certain PS...
Alias: CVE-2012-3402
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 714127 714128
Blocks: 714114
TreeView+ depends on / blocked
Reported: 2012-07-10 13:28 UTC by Jan Lieskovsky
Modified: 2021-10-19 21:55 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2021-10-19 21:55:06 UTC

Attachments (Terms of Use)
Patch to fix CVEs 2009-3909 and 2012-3402 (3.42 KB, patch)
2012-08-08 15:35 UTC, Nils Philippsen
no flags Details | Diff

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1181 0 normal SHIPPED_LIVE Moderate: gimp security update 2012-08-20 17:44:07 UTC

Description Jan Lieskovsky 2012-07-10 13:28:05 UTC
A heap-based buffer overflow flaw was found in the way Adobe Photoshop(tm) PSD plug-in of Gimp, the GNU Image Manipulation Program, performed decoding of headers, when loading certain Adobe Photoshop image files. A remote attacker could provide a specially-crafted PSD image file that, when opened in Gimp would lead to PSD plug-in crash or, potentially, arbitrary code execution with the privileges of the user running gimp executable.

This issue was found by Jan Lieskovsky of the Red Hat Security Response Team

Comment 3 Jan Lieskovsky 2012-07-11 15:52:27 UTC
The CVE identifier of CVE-2012-3402 has been assigned to this issue.

Comment 4 Nils Philippsen 2012-08-08 15:35:00 UTC
Created attachment 603059 [details]
Patch to fix CVEs 2009-3909 and 2012-3402

Comment 7 errata-xmlrpc 2012-08-20 13:45:12 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:1181 https://rhn.redhat.com/errata/RHSA-2012-1181.html

Note You need to log in before you can comment on or make changes to this bug.