GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Was ZDI-CAN-22094.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3659-1 gimp security update
Debian DSA Debian DSA DSA-5564-1 gimp security update
Ubuntu USN Ubuntu USN USN-6521-1 GIMP vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 06 Nov 2025 06:15:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:gimp:gimp:2.10.34:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 05:30:00 +0900

Type Values Removed Values Added
References

Fri, 15 Aug 2025 01:30:00 +0900

Type Values Removed Values Added
First Time appeared Gimp
Gimp gimp
CPEs cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
Vendors & Products Gimp
Gimp gimp

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.56862}

epss

{'score': 0.52714}


Fri, 11 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.5891}

epss

{'score': 0.56862}


Mon, 07 Apr 2025 23:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_eus:9.4

Tue, 03 Dec 2024 11:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-11-04T19:25:21.663Z

Reserved: 2023-09-28T18:02:49.775Z

Link: CVE-2023-44442

cve-icon Vulnrichment

Updated: 2025-11-04T19:25:21.663Z

cve-icon NVD

Status : Modified

Published: 2024-05-03T03:15:59.963

Modified: 2025-11-04T20:17:08.230

Link: CVE-2023-44442

cve-icon Redhat

Severity : Important

Publid Date: 2023-11-14T00:00:00Z

Links: CVE-2023-44442 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses