Vulnerability Details : CVE-2012-3236
Potential exploit
fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2012-3236
- cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-3236
1.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3236
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-3236
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3236
-
http://www.exploit-db.com/exploits/19482
GIMP 2.8.0 - '.FIT' File Format Denial of Service - Multiple dos ExploitExploit;Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/76658
GIMP fit denial of service CVE-2012-3236 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/54246
GIMP 'fit' File Format Denial of Service VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html
Broken Link;Exploit
-
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html
[security-announce] openSUSE-SU-2012:1080-1: important: gimp to fix variThird Party Advisory
-
http://www.ubuntu.com/usn/USN-1559-1
USN-1559-1: GIMP vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://bugzilla.gnome.org/show_bug.cgi?id=676804
Bug 676804 – file handling DoS for fit file formatIssue Tracking;Third Party Advisory
-
http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c
Bug 676804 - file handling DoS for fit file format (ace45631) · Commits · GNOME / GIMP · GitLabExploit;Patch;Vendor Advisory
-
http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html
Exploit;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:082
mandriva.comBroken Link
Jump to