7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.0005 Low
EPSS
Percentile
16.2%
GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability. This
vulnerability allows remote attackers to execute arbitrary code on affected
installations of GIMP. User interaction is required to exploit this
vulnerability in that the target must visit a malicious page or open a
malicious file. The specific flaw exists within the parsing of PSP files.
Crafted data in a PSP file can trigger an off-by-one error when calculating
a location to write within a heap-based buffer. An attacker can leverage
this vulnerability to execute code in the context of the current process.
Was ZDI-CAN-22097.
Author | Note |
---|---|
mdeslaur | same 2.10 commit as CVE-2023-44443 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | gimp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | gimp | < 2.10.18-1ubuntu0.1 | UNKNOWN |
ubuntu | 22.04 | noarch | gimp | < 2.10.30-1ubuntu0.1 | UNKNOWN |
ubuntu | 23.04 | noarch | gimp | < 2.10.34-1ubuntu0.23.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | gimp | < 2.10.34-1ubuntu0.23.10.1 | UNKNOWN |
ubuntu | 16.04 | noarch | gimp | < any | UNKNOWN |
launchpad.net/bugs/cve/CVE-2023-44444
nvd.nist.gov/vuln/detail/CVE-2023-44444
security-tracker.debian.org/tracker/CVE-2023-44444
ubuntu.com/security/notices/USN-6521-1
www.cve.org/CVERecord?id=CVE-2023-44444
www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
www.zerodayinitiative.com/advisories/ZDI-23-1591/