Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4542 to the following vulnerability: Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information. References: [1] http://openwall.com/lists/oss-security/2011/01/03/2 [2] http://openwall.com/lists/oss-security/2011/01/04/7 [3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 [4] https://bugzilla.redhat.com/show_bug.cgi?id=666793 [5] http://osvdb.org/70283 [6] http://secunia.com/advisories/42771 [7] http://www.vupen.com/english/advisories/2011/0016
This issue affects the versions of the gimp package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the versions of the gimp package, as shipped with Fedora release of 13 and 14.
Created gimp tracking bugs for this issue Affects: fedora-all [bug 706939]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0839 https://rhn.redhat.com/errata/RHSA-2011-0839.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:0838 https://rhn.redhat.com/errata/RHSA-2011-0838.html