HTTP: GNU GIMP PSP Image Channel Block Parsing Off-By-One Buffer Overflow

This signature detects attempts to exploit a known vulnerability against GNU GIMP PSP Image Channel Block . A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the GNU GIMP PSP Image Channel Block.

Extended Description

GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-22097.

Short Name
HTTP:STC:GNU-GIMP-PSP-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Block Buffer CVE-2023-44444 Channel GIMP GNU Image Off-By-One Overflow PSP Parsing
Release Date
02/12/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3742
False Positive
Unknown

Found a potential security threat?