Integer overflow, leading to heap-based buffer overflow flaw was found in the GIMP's GIF (Graphics Interchange Format) image file plug-in. An attacker could create a specially-crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. Acknowledgements: Red Hat would like to thank Matthias Weckbecker of the SUSE Security Team for reporting this issue.
The CVE identifier of CVE-2012-3481 has been assigned to this issue.
Created attachment 604980 [details] Proposed patch by Nils Philippsen for various (currently used) Gimp branches
Created gimp tracking bugs for this issue Affects: fedora-all [bug 849637]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1180 https://rhn.redhat.com/errata/RHSA-2012-1180.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:1181 https://rhn.redhat.com/errata/RHSA-2012-1181.html
gimp-2.8.2-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
gimp-2.6.12-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
gimp-2.8.2-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.