Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-3236
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-12 Jul, 2012 | 21:55
Updated At-11 Apr, 2025 | 00:51

fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

GIMP
gimp
>>gimp>>Versions before 2.9.2(exclusive)
cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-476Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.htmlcve@mitre.org
Broken Link
Exploit
http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163ccve@mitre.org
Exploit
Patch
Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.htmlcve@mitre.org
Third Party Advisory
http://www.exploit-db.com/exploits/19482cve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2013:082cve@mitre.org
Broken Link
http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.htmlcve@mitre.org
Exploit
Third Party Advisory
http://www.securityfocus.com/bid/54246cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-1559-1cve@mitre.org
Third Party Advisory
https://bugzilla.gnome.org/show_bug.cgi?id=676804cve@mitre.org
Issue Tracking
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/76658cve@mitre.org
Third Party Advisory
VDB Entry
http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Exploit
http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163caf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.exploit-db.com/exploits/19482af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2013:082af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
http://www.securityfocus.com/bid/54246af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-1559-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.gnome.org/show_bug.cgi?id=676804af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/76658af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found