Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.Referenceshttp://security.gentoo.org/glsa/glsa-201209-23.xmlhttp://www.vupen.com/english/advisories/2009/3564http://www.securityfocus.com/bid/37006http://www.vupen.com/english/advisories/2009/3228http://www.redhat.com/support/errata/RHSA-2011-0837.htmlhttp://git.gnome.org/cgit/gimp/commit/?h=gimp-2-6&id=df2b0aca2e7cdb95ebfd3454c65aaba0a83e9bbehttp://www.redhat.com/support/errata/RHSA-2011-0838.htmlhttp://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/54254https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8290http://secunia.com/advisories/37232http://secunia.com/advisories/50737http://secunia.com/secunia_research/2009-42/http://www.vupen.com/english/advisories/2010/1021http://www.securityfocus.com/archive/1/507813/100/0/threadedhttps://bugzilla.gnome.org/show_bug.cgi?id=600484http://www.osvdb.org/59930