Impact
GIMP misparses ANI animation files, causing an integer overflow that permits an attacker to overflow a buffer and execute malicious code in the GIMP process. The weakness is a classic integer overflow (CWE‑190) that allows an adversary to take complete control of the application. The vulnerability requires the victim to run a specially crafted ANI file, either by opening it directly or by visiting a page that loads the file for parsing during GIMP’s image import process.
Affected Systems
The flaw affects the GIMP image editor, specifically version 3.0.8, as identified by the CPE entry. No other vendors or product lines were listed as impacted in the CVE record.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, yet the EPSS score of less than 1 % suggests that active exploitation is unlikely at present. The vulnerability is not present in CISA’s Known Exploited Vulnerabilities catalog, and no public exploits have been documented. To exploit the flaw, an attacker must convince a user to open a malicious ANI file or to load the file via a web page, indicating that the attack vector is user‑initiated. Consequently, the overall risk is moderate, escalating in environments that routinely accept untrusted media or external files.
OpenCVE Enrichment
Debian DSA