A denial of service flaw was found in the way GIMP, GNU Image Manipulation Program, processed certain FIT format files. A remote attacker could provide a FIT format file with specially-crafted value of the 'XTENSION' header that, when opened would cause the gimp executable to crash. References: [1] http://www.reactionpenetrationtesting.co.uk/advisories/FIT-handling-DoS.html [2] http://www.reactionpenetrationtesting.co.uk/advisories/vuln.fit
Acknowledgements: Red Hat would like to thank Joseph Sheridan for reporting this issue.
Upstream bug and commit: https://bugzilla.gnome.org/show_bug.cgi?id=676804 http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c
Public now: http://www.openwall.com/lists/oss-security/2012/06/29/3
Created gimp tracking bugs for this issue Affects: fedora-all [bug 836517]
Statement: We do not consider a user-assisted crash of a client application such as Gimp to be a security issue.