A heap-based buffer overflow flaw, leading to invalid free, was found in the way KISS CEL file format plug-in of Gimp, the GNU Image Manipulation Program, performed loading of certain palette files. A remote attacker could provide a specially-crafted KISS palette file that, when opened in Gimp would cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the gimp executable. Issue found by: Murray McAllister, Red Hat Security Response Team
The CVE identifier of CVE-2012-3403 has been assigned to this issue.
Created attachment 598634 [details] updated patchsets for all gimp branches (including rhel5)
Created gimp tracking bugs for this issue Affects: fedora-all [bug 849637]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1180 https://rhn.redhat.com/errata/RHSA-2012-1180.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:1181 https://rhn.redhat.com/errata/RHSA-2012-1181.html
gimp-2.8.2-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
gimp-2.6.12-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
gimp-2.8.2-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.