CVE-2009-1570

N/A Unknown
Published: November 13, 2009 Modified: April 23, 2026
View on NVD

Description

Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
Source: PSIRT-CNA@flexerasoftware.com
Third Party Advisory
http://secunia.com/advisories/37232
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://secunia.com/advisories/50737
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://secunia.com/secunia_research/2009-42/
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://security.gentoo.org/glsa/glsa-201209-23.xml
Source: PSIRT-CNA@flexerasoftware.com
Third Party Advisory
http://www.osvdb.org/59930
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0837.html
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0838.html
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://www.securityfocus.com/archive/1/507813/100/0/threaded
Source: PSIRT-CNA@flexerasoftware.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/37006
Source: PSIRT-CNA@flexerasoftware.com
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/3228
Source: PSIRT-CNA@flexerasoftware.com
Broken Link Patch
http://www.vupen.com/english/advisories/2009/3564
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
http://www.vupen.com/english/advisories/2010/1021
Source: PSIRT-CNA@flexerasoftware.com
Broken Link
https://bugzilla.gnome.org/show_bug.cgi?id=600484
Source: PSIRT-CNA@flexerasoftware.com
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54254
Source: PSIRT-CNA@flexerasoftware.com
Third Party Advisory VDB Entry
http://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbe
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/37232
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/50737
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/secunia_research/2009-42/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-201209-23.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.osvdb.org/59930
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0837.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2011-0838.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/507813/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/37006
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/3228
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch
http://www.vupen.com/english/advisories/2009/3564
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1021
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugzilla.gnome.org/show_bug.cgi?id=600484
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54254
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
3.1%
87th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

gimp