Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows


Vulnerability Assessment Details

[GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Vulnerability Assessment Summary
ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-12
(ImageMagick, imlib, imlib2: BMP decoding buffer overflows)


Due to improper bounds checking, ImageMagick and imlib are vulnerable to a
buffer overflow when decoding runlength-encoded bitmaps. This bug can be
exploited using a specially-crafted BMP image and could potentially permit
remote code execution when this image is decoded by the user.

Impact

A specially-crafted runlength-encoded BMP could lead ImageMagick and imlib
to crash or potentially execute arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0802
http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html
http://securitytracker.com/alerts/2004/Aug/1011104.html
http://securitytracker.com/alerts/2004/Aug/1011105.html


Solution:
All ImageMagick users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
# emerge ">=media-gfx/imagemagick-6.0.7.1"
All imlib users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib-1.9.14-r2"
# emerge ">=media-libs/imlib-1.9.14-r2"
All imlib2 users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib2-1.1.2"
# emerge ">=media-libs/imlib2-1.1.2"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

HP 593742-001 NC523SFP 10GBe Dual Port Adapter 593715-001 593717-B21
$65.0
HP 593742-001 NC523SFP 10GBe Dual Port Adapter 593715-001 593717-B21 pictureAJ718A - HP Finisar 8GB SW Fibre Channel SFP+ GBIC Transceiver Module 468508-001
$12.0
AJ718A - HP Finisar 8GB SW Fibre Channel SFP+ GBIC Transceiver Module 468508-001 pictureAJ764A HP Storageworks 82Q 8GB FC Dual Port PCIE HBA QLE2562-HP w/ SFP's
$122.5
AJ764A HP Storageworks 82Q 8GB FC Dual Port PCIE HBA QLE2562-HP w/ SFP's pictureSun Oracle QLE2562-SUN 8GB Dual Port FC HBA 371-4326 w/ 2 x 8GB SFP
$82.5
Sun Oracle QLE2562-SUN 8GB Dual Port FC HBA 371-4326 w/ 2 x 8GB SFP picture


Discussions

No Discussions have been posted on this vulnerability.