CVE-2023-44441
Publication date 15 November 2023
Last updated 16 January 2025
Ubuntu priority
Cvss 3 Severity Score
GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DDS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22093.
Status
Package | Ubuntu Release | Status |
---|---|---|
gimp | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Fixed 2.10.30-1ubuntu0.1
|
|
20.04 LTS focal |
Fixed 2.10.18-1ubuntu0.1
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Ignored end of standard support | |
gimp-dds | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Vulnerable
|
|
18.04 LTS bionic |
Vulnerable
|
|
16.04 LTS xenial |
Vulnerable
|
Notes
john-breton
The DDS plugin was integrated into the main GIMP package in version 2.10.10, previous releases do not contain the vulnerability.
Patch details
Package | Patch details |
---|---|
gimp | |
gimp-dds |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6521-1
- GIMP vulnerabilities
- 29 November 2023
- USN-7209-1
- GIMP DDS Plugin vulnerabilities
- 16 January 2025
Other references
- https://www.zerodayinitiative.com/advisories/ZDI-23-1592/
- https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
- https://www.cve.org/CVERecord?id=CVE-2023-44441
- https://gitlab.gnome.org/GNOME/gimp/-/commit/7db71cd0b6e36c454aa0d2d3efeec7e636db4dbc
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e92f279c97282a2b20dca0d923db7465f2057703
- https://gitlab.gnome.org/GNOME/gimp/-/commit/9dda8139e4d07e3a273436eda993fef32555edbe