Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows


Vulnerability Assessment Details

[GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Vulnerability Assessment Summary
ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-12
(ImageMagick, imlib, imlib2: BMP decoding buffer overflows)


Due to improper bounds checking, ImageMagick and imlib are vulnerable to a
buffer overflow when decoding runlength-encoded bitmaps. This bug can be
exploited using a specially-crafted BMP image and could potentially permit
remote code execution when this image is decoded by the user.

Impact

A specially-crafted runlength-encoded BMP could lead ImageMagick and imlib
to crash or potentially execute arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0802
http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html
http://securitytracker.com/alerts/2004/Aug/1011104.html
http://securitytracker.com/alerts/2004/Aug/1011105.html


Solution:
All ImageMagick users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
# emerge ">=media-gfx/imagemagick-6.0.7.1"
All imlib users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib-1.9.14-r2"
# emerge ">=media-libs/imlib-1.9.14-r2"
All imlib2 users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib2-1.1.2"
# emerge ">=media-libs/imlib2-1.1.2"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Genuine Dell Poweredge 2650 Server Processor Fan Brushless AFB0612EH P/N 7K412
$6.95
Genuine Dell Poweredge 2650 Server Processor Fan Brushless AFB0612EH P/N 7K412 picture24 Pin Female to DELL Optiplex Server Motherboard 8 Pin Male'Adapter PowerSN
$6.87
24 Pin Female to DELL Optiplex Server Motherboard 8 Pin Male'Adapter PowerSN pictureDell PowerEdge R630 8SFF/2xE5-2683 V3 2.0GHz 14C/64GB/H730P/6x 600GB 10K SAS
$1499.0
Dell PowerEdge R630 8SFF/2xE5-2683 V3 2.0GHz 14C/64GB/H730P/6x 600GB 10K SAS pictureDell PowerEdge R420 8SFF/2x E5-2450 2.1GHz 8C/H710p/64GB/4x 900GB SAS HDD
$499.0
Dell PowerEdge R420 8SFF/2x E5-2450 2.1GHz 8C/H710p/64GB/4x 900GB SAS HDD picture


Discussions

No Discussions have been posted on this vulnerability.