{"id":"CVE-2010-4540","details":"Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the \"LIGHTING EFFECTS \u003e LIGHT\" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.  NOTE: some of these details are obtained from third party information.","modified":"2026-04-10T03:41:31.758002Z","published":"2011-01-07T20:00:04Z","related":["openSUSE-SU-2024:10294-1"],"references":[{"type":"ADVISORY","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"},{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2011/01/03/2"},{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2011/01/04/7"},{"type":"ADVISORY","url":"http://secunia.com/advisories/42771"},{"type":"ADVISORY","url":"http://secunia.com/advisories/44750"},{"type":"ADVISORY","url":"http://secunia.com/advisories/48236"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50737"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-201209-23.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2426"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0016"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=666793"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64582"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2011/01/03/2"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2011/01/04/7"},{"type":"EVIDENCE","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"},{"type":"EVIDENCE","url":"http://openwall.com/lists/oss-security/2011/01/03/2"},{"type":"EVIDENCE","url":"http://openwall.com/lists/oss-security/2011/01/04/7"},{"type":"EVIDENCE","url":"https://bugzilla.redhat.com/show_bug.cgi?id=666793"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=666793"},{"type":"WEB","url":"http://osvdb.org/70282"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-0838.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-0839.html"}],"schema_version":"1.7.5"}