Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4887: Off-by-one Error in Red Hat Red Hat Enterprise Linux 6

0
Medium
VulnerabilityCVE-2026-4887cvecve-2026-4887
Published: Thu Mar 26 2026 (03/26/2026, 12:08:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6

Description

CVE-2026-4887 is a medium severity vulnerability in the GIMP image editor included in Red Hat Enterprise Linux 6. It arises from an off-by-one error in the PCX file loader, causing a heap buffer over-read. An attacker can exploit this by tricking a user into opening a maliciously crafted PCX image file. Successful exploitation may disclose out-of-bounds memory contents and cause the application to crash, resulting in denial of service. The vulnerability requires local access with user interaction and does not require privileges. There are no known exploits in the wild currently. The CVSS score is 6. 1, reflecting limited confidentiality impact but high availability impact. Organizations running RHEL 6 with GIMP installed should apply patches or mitigate exposure to untrusted PCX files to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 13:31:11 UTC

Technical Analysis

CVE-2026-4887 is a vulnerability identified in the GIMP image manipulation program bundled with Red Hat Enterprise Linux 6. The flaw is an off-by-one error in the PCX file loader component, which leads to a heap buffer over-read when processing specially crafted PCX image files. This memory over-read can cause the application to disclose memory contents beyond the intended buffer boundaries, potentially leaking sensitive information from the process memory space. Additionally, the out-of-bounds read can trigger application instability and crashes, resulting in denial of service conditions. Exploitation requires a local user to open a malicious PCX file, thus user interaction is necessary, and no elevated privileges are required. The vulnerability is scored 6.1 on the CVSS v3.1 scale, with attack vector local, low attack complexity, no privileges required, user interaction required, and impacts limited to confidentiality (low) and availability (high). No known exploits have been reported in the wild, and no patches or mitigations are explicitly linked in the provided data. The issue stems from improper bounds checking in the PCX loader code, a classic off-by-one programming error that allows reading memory just beyond the allocated buffer.

Potential Impact

The primary impact of CVE-2026-4887 is denial of service due to application crashes when opening malicious PCX files in GIMP on RHEL 6 systems. This can disrupt workflows for users relying on GIMP for image editing. The secondary impact is limited information disclosure from out-of-bounds memory reads, which could potentially leak sensitive data from the application's memory space, though the extent and sensitivity of such data are uncertain. Since exploitation requires user interaction and local access, remote exploitation is not feasible without social engineering. Organizations with RHEL 6 systems used in environments where users handle untrusted image files are at risk. The vulnerability does not affect system integrity or allow privilege escalation, limiting its severity. However, denial of service in critical environments could cause operational disruptions. Given RHEL 6's age, many organizations may have migrated away, but legacy systems remain vulnerable if GIMP is installed and used.

Mitigation Recommendations

To mitigate CVE-2026-4887, organizations should first apply any available patches or updates from Red Hat that address the GIMP PCX loader vulnerability. If patches are not yet available, consider disabling or uninstalling GIMP on RHEL 6 systems where it is not essential. Restrict user ability to open untrusted or unsolicited PCX image files, especially from external sources or email attachments, through user training and endpoint security controls. Implement application whitelisting or sandboxing to limit the impact of potential crashes. Monitor systems for abnormal GIMP crashes or suspicious activity related to image file handling. For environments requiring GIMP, consider upgrading to a supported OS version with updated GIMP packages. Additionally, review and harden local user permissions to minimize risk from local exploitation. Network-level controls can help prevent delivery of malicious PCX files, but user interaction remains a key factor.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-26T11:33:19.455Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c531a1f4197a8e3bc7ddac

Added to database: 3/26/2026, 1:16:17 PM

Last enriched: 3/26/2026, 1:31:11 PM

Last updated: 3/26/2026, 3:38:03 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses