CVE-2012-2763

NameCVE-2012-2763
DescriptionBuffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gimp (PTS)jessie, jessie (lts)2.8.14-1+deb8u2fixed
stretch (security)2.8.18-1+deb9u1fixed
stretch (lts), stretch2.8.18-1+deb9u2fixed
buster (security), buster, buster (lts)2.10.8-2+deb10u1fixed
bullseye2.10.22-4+deb11u2fixed
bullseye (security)2.10.22-4+deb11u1fixed
bookworm2.10.34-1+deb12u2fixed
bookworm (security)2.10.34-1+deb12u1fixed
sid2.10.38-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gimpsource(unstable)2.8.0-1unimportant

Notes

Only exploitable in rare/theoretical setups
https://www.openwall.com/lists/oss-security/2012/05/31/1
http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html
http://www.reactionpenetrationtesting.co.uk/advisories/scriptfubof.c

Search for package or bug name: Reporting problems