Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA547] DSA-547-1 imagemagick


Vulnerability Assessment Details

[DSA547] DSA-547-1 imagemagick

Vulnerability Assessment Summary
DSA-547-1 imagemagick

Detailed Explanation for this Vulnerability Assessment

Marcus Meissner from SUSE has discovered several buffer overflows in
the ImageMagick graphics library. A possible hacker could create a
malicious image or video file in AVI, BMP, or DIB format that could
crash the reading process. It might be possible that carefully
crafted images could also permit to execute arbitrary code with the
capabilities of the invoking process.
For the stable distribution (woody) this problem has been fixed in
version 5.4.4.5-1woody3.
For the unstable distribution (sid) this problem has been fixed in
version 6.0.6.2-1.
We recommend that you upgrade your imagemagick packages.


Solution : http://www.debian.org/security/2004/dsa-547
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Dell Latitude 5480 L5480-2B8V0G2 Notebook PC - Intel Core i3-7100U 2.4 GHz Dual-
$702.58
Dell Latitude 5480 L5480-2B8V0G2 Notebook PC - Intel Core i3-7100U 2.4 GHz Dual- pictureAcer Verition M4618G 8GB Intel Core i3-2120 3.30GHz 500GB
$103.46
Acer Verition M4618G 8GB Intel Core i3-2120 3.30GHz 500GB pictureiMac ME088LL/A 27" 8GB Intel Core i5 3.2GHz 1TB
$659.7
iMac ME088LL/A 27HP Z230 Desktop 8GB Intel Core i5-4570 3.20GHz 2TB
$206.92
HP Z230 Desktop 8GB Intel Core i5-4570 3.20GHz 2TB picture


Discussions

No Discussions have been posted on this vulnerability.