vulnerability
Oracle Linux: CVE-2023-44444: ELSA-2024-0675: gimp security update (IMPORTANT) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Nov 14, 2023 | May 21, 2024 | Mar 25, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Nov 14, 2023
Added
May 21, 2024
Modified
Mar 25, 2026
Description
GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-22097.
A parsing vulnerability was found in the GNU Image Manipulation Program (GIMP). This flaw allows an unauthenticated, remote attacker to trick a GIMP user into opening a malicious PSP file, possibly enabling the execution of unauthorized code within the GIMP process.
The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-22097.
A parsing vulnerability was found in the GNU Image Manipulation Program (GIMP). This flaw allows an unauthenticated, remote attacker to trick a GIMP user into opening a malicious PSP file, possibly enabling the execution of unauthorized code within the GIMP process.
Solutions
oracle-linux-upgrade-gimporacle-linux-upgrade-gimp-develoracle-linux-upgrade-gimp-devel-toolsoracle-linux-upgrade-gimp-libsoracle-linux-upgrade-pygobject2oracle-linux-upgrade-pygobject2-codegenoracle-linux-upgrade-pygobject2-develoracle-linux-upgrade-pygobject2-docoracle-linux-upgrade-pygtk2oracle-linux-upgrade-pygtk2-codegenoracle-linux-upgrade-pygtk2-develoracle-linux-upgrade-pygtk2-docoracle-linux-upgrade-python2-cairooracle-linux-upgrade-python2-cairo-devel
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.