Synopsis
The remote Mandriva Linux host is missing one or more security updates.
Description
Multiple vulnerabilities has been discovered and corrected in gimp :
A heap-based buffer overflow flaw, leading to invalid free, was found in the way KISS CEL file format plug-in of Gimp, the GNU Image Manipulation Program, performed loading of certain palette files. A remote attacker could provide a specially crafted KISS palette file that, when opened in Gimp would cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the gimp executable (CVE-2012-3403).
Integer overflow, leading to heap-based buffer overflow flaw was found in the GIMP's GIF (Graphics Interchange Format) image file plug-in. An attacker could create a specially crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP (CVE-2012-3481).
The updated gimp packages have been upgraded to the 2.6.12 version and patched to correct these issues.
Additionally for Mandriva Enterprise server 5 the gegl packages was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9, the enscript packages was added because of a build dependency, the gutenprint and mtink packages was rebuilt against the gimp 2.6.12 libraries.
Solution
Update the affected packages.
Plugin Details
File Name: mandriva_MDVSA-2012-142.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: p-cpe:/a:mandriva:linux:gimp, p-cpe:/a:mandriva:linux:gimp-python, p-cpe:/a:mandriva:linux:lib64gimp2.0-devel, p-cpe:/a:mandriva:linux:lib64gimp2.0_0, p-cpe:/a:mandriva:linux:libgimp2.0-devel, p-cpe:/a:mandriva:linux:libgimp2.0_0, cpe:/o:mandriva:linux:2011
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 8/21/2012