Vulnerability Description
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gimp | Gimp | <= 2.10.2 |
References
- https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524fPatchThird Party Advisory
- https://gitlab.gnome.org/GNOME/gimp/issues/1689Issue TrackingThird Party Advisory
- https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524fPatchThird Party Advisory
- https://gitlab.gnome.org/GNOME/gimp/issues/1689Issue TrackingThird Party Advisory
FAQ
What is CVE-2018-12713?
CVE-2018-12713 is a vulnerability with a CVSS score of 9.1 (CRITICAL). GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/test...
How severe is CVE-2018-12713?
CVE-2018-12713 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-12713?
Check the references section above for vendor advisories and patch information. Affected products include: Gimp Gimp.