### [CVE-2010-4542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file. NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information. ### POC #### Reference - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 - https://bugzilla.redhat.com/show_bug.cgi?id=666793 #### Github No PoCs found on GitHub currently.