Bug 1217161 (CVE-2023-44442) - VUL-0: CVE-2023-44442: gimp: GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Summary: VUL-0: CVE-2023-44442: gimp: GIMP PSD File Parsing Heap-based Buffer Overflow...
Status: NEW
Alias: CVE-2023-44442
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/385229/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-44442:7.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-15 08:59 UTC by SMASH SMASH
Modified: 2024-06-11 14:44 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-11-15 08:59:49 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process.

References:
https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44442
Comment 1 Gabriele Sonnu 2023-11-15 09:33:40 UTC
Tracking as affected:

- SUSE:SLE-12-SP2:Update
- SUSE:SLE-15-SP4:Update


Upstream fix:

https://gitlab.gnome.org/GNOME/gimp/-/commit/865cc56894dcb6e1c664a55e4b4010ebf6919e10
Comment 5 Maintenance Automation 2023-12-07 16:30:08 UTC
SUSE-SU-2023:4692-1: An update that solves four vulnerabilities can now be installed.

Category: security (important)
Bug References: 1217160, 1217161, 1217162, 1217163
CVE References: CVE-2023-44441, CVE-2023-44442, CVE-2023-44443, CVE-2023-44444
Sources used:
openSUSE Leap 15.4 (src): gimp-2.10.30-150400.3.11.1
openSUSE Leap 15.5 (src): gimp-2.10.30-150400.3.11.1
SUSE Package Hub 15 15-SP4 (src): gimp-2.10.30-150400.3.11.1
SUSE Package Hub 15 15-SP5 (src): gimp-2.10.30-150400.3.11.1
SUSE Linux Enterprise Workstation Extension 15 SP4 (src): gimp-2.10.30-150400.3.11.1
SUSE Linux Enterprise Workstation Extension 15 SP5 (src): gimp-2.10.30-150400.3.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2023-12-11 20:36:44 UTC
SUSE-SU-2023:4697-1: An update that solves two vulnerabilities can now be installed.

Category: security (important)
Bug References: 1217161, 1217163
CVE References: CVE-2023-44442, CVE-2023-44444
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): gimp-2.8.18-9.27.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): gimp-2.8.18-9.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.