HTTP: GNU GIMP PSD Image Channel Data Parsing Heap Buffer Overflow

This signature detects attempts to exploit a known vulnerability against GNU Image Manipulation Program (GIMP). A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Extended Description

GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Was ZDI-CAN-22094.

Short Name
HTTP:OVERFLOW:GNU-GIMP-PSD-IMG
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2023-44442 Channel Data GIMP GNU Heap Image Overflow PSD Parsing
Release Date
04/04/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3702
False Positive
Unknown

Found a potential security threat?