Vulnerabilities > CVE-2011-2896 - Out-of-bounds Write vulnerability in multiple products

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
swi-prolog
apple
gimp
CWE-787
nessus

Summary

The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.

Vulnerable Configurations

Part Description Count
Application
Swi-Prolog
243
Application
Apple
92
Application
Gimp
176

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2012-1180.NASL
    descriptionUpdated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP
    last seen2020-06-01
    modified2020-06-02
    plugin id61599
    published2012-08-21
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61599
    titleCentOS 6 : gimp (CESA-2012:1180)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2012:1180 and 
    # CentOS Errata and Security Advisory 2012:1180 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61599);
      script_version("1.9");
      script_cvs_date("Date: 2020/01/07");
    
      script_cve_id("CVE-2011-2896", "CVE-2012-3403", "CVE-2012-3481");
      script_xref(name:"RHSA", value:"2012:1180");
    
      script_name(english:"CentOS 6 : gimp (CESA-2012:1180)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated gimp packages that fix three security issues are now available
    for Red Hat Enterprise Linux 6.
    
    The Red Hat Security Response Team has rated this update as having
    moderate security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    The GIMP (GNU Image Manipulation Program) is an image composition and
    editing program.
    
    An integer overflow flaw, leading to a heap-based buffer overflow, was
    found in the GIMP's GIF image format plug-in. An attacker could create
    a specially crafted GIF image file that, when opened, could cause the
    GIF plug-in to crash or, potentially, execute arbitrary code with the
    privileges of the user running the GIMP. (CVE-2012-3481)
    
    A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch
    (LZW) decompression algorithm implementation used by the GIMP's GIF
    image format plug-in. An attacker could create a specially crafted GIF
    image file that, when opened, could cause the GIF plug-in to crash or,
    potentially, execute arbitrary code with the privileges of the user
    running the GIMP. (CVE-2011-2896)
    
    A heap-based buffer overflow flaw was found in the GIMP's KiSS CEL
    file format plug-in. An attacker could create a specially crafted KiSS
    palette file that, when opened, could cause the CEL plug-in to crash
    or, potentially, execute arbitrary code with the privileges of the
    user running the GIMP. (CVE-2012-3403)
    
    Red Hat would like to thank Matthias Weckbecker of the SUSE Security
    Team for reporting the CVE-2012-3481 issue.
    
    Users of the GIMP are advised to upgrade to these updated packages,
    which contain backported patches to correct these issues. The GIMP
    must be restarted for the update to take effect."
      );
      # https://lists.centos.org/pipermail/centos-announce/2012-August/018813.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?7e02ea4c"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gimp packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3403");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:gimp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:gimp-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:gimp-devel-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:gimp-help-browser");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:gimp-libs");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2011/08/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/21");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 6.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-6", reference:"gimp-2.6.9-4.el6_3.3")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"gimp-devel-2.6.9-4.el6_3.3")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"gimp-devel-tools-2.6.9-4.el6_3.3")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"gimp-help-browser-2.6.9-4.el6_3.3")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"gimp-libs-2.6.9-4.el6_3.3")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gimp / gimp-devel / gimp-devel-tools / gimp-help-browser / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_GIMP-110923.NASL
    descriptionSpecially crafted gif files could have caused an infinite loop or a heap-based buffer overflow in the gif decoder (CVE-2011-2896). This has been fixed.
    last seen2020-06-01
    modified2020-06-02
    plugin id57104
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57104
    titleSuSE 11.1 Security Update : Gimp (SAT Patch Number 5193)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(57104);
      script_version("1.5");
      script_cvs_date("Date: 2019/10/25 13:36:42");
    
      script_cve_id("CVE-2011-2896");
    
      script_name(english:"SuSE 11.1 Security Update : Gimp (SAT Patch Number 5193)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Specially crafted gif files could have caused an infinite loop or a
    heap-based buffer overflow in the gif decoder (CVE-2011-2896). This
    has been fixed."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=711491"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2011-2896.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 5193.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:gimp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:gimp-lang");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:gimp-plugins-python");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2011/09/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, "SuSE 11.1");
    
    
    flag = 0;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"gimp-2.6.2-3.34.33.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"gimp-lang-2.6.2-3.34.33.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"gimp-plugins-python-2.6.2-3.34.33.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"gimp-2.6.2-3.34.33.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"gimp-lang-2.6.2-3.34.33.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"gimp-plugins-python-2.6.2-3.34.33.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-10761.NASL
    descriptionThis update adds checks to avoid heap corruption and buffer overflows when loading GIF image files (CVE-2011-2896). Additionally, it fixes a bug which caused GIMP to print an unnecessary warning to the command line on startup. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55949
    published2011-08-23
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55949
    titleFedora 16 : gimp-2.6.11-21.fc16 (2011-10761)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2011-10761.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(55949);
      script_version("1.9");
      script_cvs_date("Date: 2019/08/02 13:32:33");
    
      script_cve_id("CVE-2011-2896");
      script_bugtraq_id(49148);
      script_xref(name:"FEDORA", value:"2011-10761");
    
      script_name(english:"Fedora 16 : gimp-2.6.11-21.fc16 (2011-10761)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update adds checks to avoid heap corruption and buffer overflows
    when loading GIF image files (CVE-2011-2896). Additionally, it fixes a
    bug which caused GIMP to print an unnecessary warning to the command
    line on startup.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=727800"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2011-August/064232.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?9d3ff5d7"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected gimp package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gimp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:16");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2011/08/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/08/23");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^16([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 16.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC16", reference:"gimp-2.6.11-21.fc16")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gimp");
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201209-23.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201209-23 (GIMP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in GIMP. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id62379
    published2012-09-29
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/62379
    titleGLSA-201209-23 : GIMP: Multiple vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-11221.NASL
    descriptionThis update avoids a GIF reader loop (CVE-2011-2896). The new upstream release fixes a number of scheduler, driver, and backend issues. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56148
    published2011-09-12
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56148
    titleFedora 14 : cups-1.4.8-2.fc14 (2011-11221)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20120820_GIMP_ON_SL6_X.NASL
    descriptionThe GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP
    last seen2020-03-18
    modified2012-08-21
    plugin id61606
    published2012-08-21
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61606
    titleScientific Linux Security Update : gimp on SL6.x i386/x86_64 (20120820)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_GIMP-110916.NASL
    descriptionspecially crafted gif files could cause an infinite loop or a heap-based buffer overflow in the gif decoder (CVE-2011-2896).
    last seen2020-06-01
    modified2020-06-02
    plugin id75515
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75515
    titleopenSUSE Security Update : gimp (openSUSE-SU-2011:1152-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-10788.NASL
    descriptionThis update adds checks to avoid heap corruption and buffer overflows when loading GIF image files (CVE-2011-2896). Additionally, it fixes a bug which caused GIMP to print an unnecessary warning to the command line on startup. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55911
    published2011-08-20
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55911
    titleFedora 15 : gimp-2.6.11-21.fc15 (2011-10788)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CUPS-7775.NASL
    descriptionThis update fixes the following security issues : - 601830: CSRF via admin web interface. (CVE-2010-0540) - 680210: users in group
    last seen2020-06-01
    modified2020-06-02
    plugin id57172
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57172
    titleSuSE 10 Security Update : CUPS (ZYPP Patch Number 7775)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2012-1181.NASL
    descriptionFrom Red Hat Security Advisory 2012:1181 : Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP
    last seen2020-06-01
    modified2020-06-02
    plugin id68601
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68601
    titleOracle Linux 5 : gimp (ELSA-2012-1181)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2357.NASL
    descriptionAccording to the versions of the libXfont package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.(CVE-2011-2895) - In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server.(CVE-2017-13722) - In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because
    last seen2020-05-08
    modified2019-12-10
    plugin id131849
    published2019-12-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131849
    titleEulerOS 2.0 SP2 : libXfont (EulerOS-SA-2019-2357)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1207-1.NASL
    descriptionTomas Hoger discovered that the CUPS image library incorrectly handled LZW streams. A remote attacker could use this flaw to cause a denial of service or possibly execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56206
    published2011-09-15
    reporterUbuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56206
    titleUbuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : cups, cupsys vulnerabilities (USN-1207-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-146.NASL
    descriptionMultiple vulnerabilities has been discovered and corrected in cups : The cupsDoAuthentication function in auth.c in the client in CUPS before 1.4.4, when HAVE_GSSAPI is omitted, does not properly handle a demand for authorization, which allows remote CUPS servers to cause a denial of service (infinite loop) via HTTP_UNAUTHORIZED responses (CVE-2010-2432). The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895 (CVE-2011-2896). The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896 (CVE-2011-3170). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56447
    published2011-10-11
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56447
    titleMandriva Linux Security Advisory : cups (MDVSA-2011:146)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1214-1.NASL
    descriptionTomas Hoger discovered that GIMP incorrectly handled malformed LZW streams. If a user were tricked into opening a specially crafted GIF image file, an attacker could cause GIMP to crash, or possibly execute arbitrary code with the user
    last seen2020-06-01
    modified2020-06-02
    plugin id56280
    published2011-09-23
    reporterUbuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56280
    titleUbuntu 10.04 LTS / 10.10 / 11.04 : gimp vulnerability (USN-1214-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-1181.NASL
    descriptionUpdated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP
    last seen2020-06-01
    modified2020-06-02
    plugin id61604
    published2012-08-21
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61604
    titleRHEL 5 : gimp (RHSA-2012:1181)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-153.NASL
    descriptionA vulnerability has been discovered and corrected in libxfont : The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896 (CVE-2011-2895). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id56531
    published2011-10-18
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56531
    titleMandriva Linux Security Advisory : libxfont (MDVSA-2011:153)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2354.NASL
    descriptionPetr Sklenar and Tomas Hoger discovered that missing input sanitising in the GIF decoder inside the CUPS printing system could lead to denial of service or potentially arbitrary code execution through crafted GIF files.
    last seen2020-03-17
    modified2011-12-01
    plugin id56982
    published2011-12-01
    reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56982
    titleDebian DSA-2354-1 : cups - several vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_GIMP-7776.NASL
    descriptionSpecially crafted gif files could have caused an infinite loop or a heap-based buffer overflow in the gif decoder (CVE-2011-2896). This has been fixed.
    last seen2020-06-01
    modified2020-06-02
    plugin id57200
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57200
    titleSuSE 10 Security Update : Gimp (ZYPP Patch Number 7776)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-11173.NASL
    descriptionThis update avoids a GIF reader loop (CVE-2011-2896). This update enables CUPS by default. This update re-introduces support for Avahi. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56014
    published2011-08-31
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56014
    titleFedora 16 : cups-1.5.0-6.fc16 (2011-11173)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_GIMP-110916.NASL
    descriptionspecially crafted gif files could cause an infinite loop or a heap-based buffer overflow in the gif decoder (CVE-2011-2896).
    last seen2020-06-01
    modified2020-06-02
    plugin id75850
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75850
    titleopenSUSE Security Update : gimp (openSUSE-SU-2011:1152-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-11197.NASL
    descriptionThis update avoids a GIF reader loop (CVE-2011-2896). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55990
    published2011-08-29
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55990
    titleFedora 15 : cups-1.4.8-2.fc15 (2011-11197)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_CUPS-110921.NASL
    descriptionThis update fixes the following security issues : - 601830: CSRF via admin web interface. (CVE-2010-0540) - 680210: users in group
    last seen2020-06-01
    modified2020-06-02
    plugin id57094
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57094
    titleSuSE 11.1 Security Update : CUPS (SAT Patch Number 5180)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1635.NASL
    descriptionUpdated cups packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems. A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the CUPS GIF image format reader. An attacker could create a malicious GIF image file that, when printed, could possibly cause CUPS to crash or, potentially, execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id57018
    published2011-12-06
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57018
    titleRHEL 6 : cups (RHSA-2011:1635)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2012-1180.NASL
    descriptionFrom Red Hat Security Advisory 2012:1180 : Updated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP
    last seen2020-06-01
    modified2020-06-02
    plugin id68600
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68600
    titleOracle Linux 6 : gimp (ELSA-2012-1180)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-0302.NASL
    descriptionUpdated cups packages that fix one security issue and various bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the CUPS GIF image format reader. An attacker could create a malicious GIF image file that, when printed, could possibly cause CUPS to crash or, potentially, execute arbitrary code with the privileges of the
    last seen2020-04-16
    modified2012-02-21
    plugin id58056
    published2012-02-21
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/58056
    titleRHEL 5 : cups (RHSA-2012:0302)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-1180.NASL
    descriptionUpdated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the GIMP
    last seen2020-06-01
    modified2020-06-02
    plugin id61603
    published2012-08-21
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61603
    titleRHEL 6 : gimp (RHSA-2012:1180)
  • NASL familyMisc.
    NASL idCUPS_1_4_7.NASL
    descriptionAccording to its banner, the version of CUPS installed on the remote host is earlier than 1.4.7. There is a boundary error in the function
    last seen2020-06-01
    modified2020-06-02
    plugin id56007
    published2011-08-29
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56007
    titleCUPS < 1.4.7 'gif_read_lzw' Buffer Overflow
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2012-1181.NASL
    descriptionUpdated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP
    last seen2020-06-01
    modified2020-06-02
    plugin id61600
    published2012-08-21
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61600
    titleCentOS 5 : gimp (CESA-2012:1181)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-11229.NASL
    descriptionFix bugs in GIF image decoder Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56149
    published2011-09-12
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56149
    titleFedora 16 : pl-5.10.2-5.fc16 (2011-11229)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2012-0302.NASL
    descriptionFrom Red Hat Security Advisory 2012:0302 : Updated cups packages that fix one security issue and various bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the CUPS GIF image format reader. An attacker could create a malicious GIF image file that, when printed, could possibly cause CUPS to crash or, potentially, execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id68473
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68473
    titleOracle Linux 5 : cups (ELSA-2012-0302)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-11305.NASL
    descriptionFix bugs in GIF image decoder Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56131
    published2011-09-09
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56131
    titleFedora 15 : pl-5.10.2-5.fc15 (2011-11305)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20120221_CUPS_ON_SL5_X.NASL
    descriptionThe Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the CUPS GIF image format reader. An attacker could create a malicious GIF image file that, when printed, could possibly cause CUPS to crash or, potentially, execute arbitrary code with the privileges of the
    last seen2020-03-18
    modified2012-08-01
    plugin id61259
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61259
    titleScientific Linux Security Update : cups on SL5.x i386/x86_64 (20120221)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-167.NASL
    descriptionA vulnerability has been discovered and corrected in gimp : The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895 (CVE-2011-2896). The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56726
    published2011-11-07
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56726
    titleMandriva Linux Security Advisory : gimp (MDVSA-2011:167)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20111206_CUPS_ON_SL6_X.NASL
    descriptionThe Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems. A heap-based buffer overflow flaw was found in the Lempel-Ziv-Welch (LZW) decompression algorithm implementation used by the CUPS GIF image format reader. An attacker could create a malicious GIF image file that, when printed, could possibly cause CUPS to crash or, potentially, execute arbitrary code with the privileges of the
    last seen2020-06-01
    modified2020-06-02
    plugin id61186
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61186
    titleScientific Linux Security Update : cups on SL6.x i386/x86_64
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-11318.NASL
    descriptionFix bugs in GIF image decoder Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56132
    published2011-09-09
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56132
    titleFedora 14 : pl-5.7.11-7.fc14 (2011-11318)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20120820_GIMP_ON_SL5_X.NASL
    descriptionThe GIMP (GNU Image Manipulation Program) is an image composition and editing program. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the GIMP
    last seen2020-03-18
    modified2012-08-21
    plugin id61605
    published2012-08-21
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61605
    titleScientific Linux Security Update : gimp on SL5.x i386/x86_64 (20120820)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2426.NASL
    descriptionSeveral vulnerabilities have been identified in GIMP, the GNU Image Manipulation Program. - CVE-2010-4540 Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the
    last seen2020-03-17
    modified2012-03-07
    plugin id58250
    published2012-03-07
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/58250
    titleDebian DSA-2426-1 : gimp - several vulnerabilities
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CUPS-7774.NASL
    descriptionThis update fixes the following security issues : - 601830: CSRF via admin web interface. (CVE-2010-0540) - 680210: users in group
    last seen2020-06-01
    modified2020-06-02
    plugin id56603
    published2011-10-24
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56603
    titleSuSE 10 Security Update : CUPS (ZYPP Patch Number 7774)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-147.NASL
    descriptionA vulnerability has been discovered and corrected in cups : The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896 (CVE-2011-3170). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id61931
    published2012-09-06
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61931
    titleMandriva Linux Security Advisory : cups (MDVSA-2011:147)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-10782.NASL
    descriptionThis update adds checks to avoid heap corruption and buffer overflows when loading GIF image files (CVE-2011-2896). Additionally, it fixes a bug which caused GIMP to print an unnecessary warning to the command line on startup. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55951
    published2011-08-23
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55951
    titleFedora 14 : gimp-2.6.11-21.fc14 (2011-10782)

Redhat

advisories
  • bugzilla
    id744791
    titlecups init script should source /etc/sysconfig/cups
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentcups-devel is earlier than 1:1.4.2-44.el6
            ovaloval:com.redhat.rhsa:tst:20111635001
          • commentcups-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20150386012
        • AND
          • commentcups-php is earlier than 1:1.4.2-44.el6
            ovaloval:com.redhat.rhsa:tst:20111635003
          • commentcups-php is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100866004
        • AND
          • commentcups-libs is earlier than 1:1.4.2-44.el6
            ovaloval:com.redhat.rhsa:tst:20111635005
          • commentcups-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20150386006
        • AND
          • commentcups-lpd is earlier than 1:1.4.2-44.el6
            ovaloval:com.redhat.rhsa:tst:20111635007
          • commentcups-lpd is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20150386008
        • AND
          • commentcups is earlier than 1:1.4.2-44.el6
            ovaloval:com.redhat.rhsa:tst:20111635009
          • commentcups is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20150386004
    rhsa
    idRHSA-2011:1635
    released2011-12-05
    severityLow
    titleRHSA-2011:1635: cups security and bug fix update (Low)
  • bugzilla
    id727800
    titleCVE-2011-2896 David Koblas' GIF decoder LZW decoder buffer overflow
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentcups-lpd is earlier than 1:1.3.7-30.el5
            ovaloval:com.redhat.rhsa:tst:20120302001
          • commentcups-lpd is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070123015
        • AND
          • commentcups is earlier than 1:1.3.7-30.el5
            ovaloval:com.redhat.rhsa:tst:20120302003
          • commentcups is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070123009
        • AND
          • commentcups-devel is earlier than 1:1.3.7-30.el5
            ovaloval:com.redhat.rhsa:tst:20120302005
          • commentcups-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070123011
        • AND
          • commentcups-libs is earlier than 1:1.3.7-30.el5
            ovaloval:com.redhat.rhsa:tst:20120302007
          • commentcups-libs is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070123013
    rhsa
    idRHSA-2012:0302
    released2012-02-21
    severityLow
    titleRHSA-2012:0302: cups security and bug fix update (Low)
  • rhsa
    idRHSA-2012:1180
  • rhsa
    idRHSA-2012:1181
rpms
  • cups-1:1.4.2-44.el6
  • cups-debuginfo-1:1.4.2-44.el6
  • cups-devel-1:1.4.2-44.el6
  • cups-libs-1:1.4.2-44.el6
  • cups-lpd-1:1.4.2-44.el6
  • cups-php-1:1.4.2-44.el6
  • cups-1:1.3.7-30.el5
  • cups-debuginfo-1:1.3.7-30.el5
  • cups-devel-1:1.3.7-30.el5
  • cups-libs-1:1.3.7-30.el5
  • cups-lpd-1:1.3.7-30.el5
  • gimp-2:2.6.9-4.el6_3.3
  • gimp-debuginfo-2:2.6.9-4.el6_3.3
  • gimp-devel-2:2.6.9-4.el6_3.3
  • gimp-devel-tools-2:2.6.9-4.el6_3.3
  • gimp-help-browser-2:2.6.9-4.el6_3.3
  • gimp-libs-2:2.6.9-4.el6_3.3
  • gimp-2:2.2.13-2.0.7.el5_8.5
  • gimp-debuginfo-2:2.2.13-2.0.7.el5_8.5
  • gimp-devel-2:2.2.13-2.0.7.el5_8.5
  • gimp-libs-2:2.2.13-2.0.7.el5_8.5

References