Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows


Vulnerability Assessment Details

[GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Vulnerability Assessment Summary
ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-12
(ImageMagick, imlib, imlib2: BMP decoding buffer overflows)


Due to improper bounds checking, ImageMagick and imlib are vulnerable to a
buffer overflow when decoding runlength-encoded bitmaps. This bug can be
exploited using a specially-crafted BMP image and could potentially permit
remote code execution when this image is decoded by the user.

Impact

A specially-crafted runlength-encoded BMP could lead ImageMagick and imlib
to crash or potentially execute arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0802
http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html
http://securitytracker.com/alerts/2004/Aug/1011104.html
http://securitytracker.com/alerts/2004/Aug/1011105.html


Solution:
All ImageMagick users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
# emerge ">=media-gfx/imagemagick-6.0.7.1"
All imlib users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib-1.9.14-r2"
# emerge ">=media-libs/imlib-1.9.14-r2"
All imlib2 users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib2-1.1.2"
# emerge ">=media-libs/imlib2-1.1.2"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

MYLEX ACCELERAID 170 ULTRA160 SCSI RAID 32MB REF. D040474-32NB Raid Controler
$86.1
MYLEX ACCELERAID 170 ULTRA160 SCSI RAID 32MB REF. D040474-32NB Raid Controler pictureDual 2.5 SATA-3 HDD SDD RAID 0 1 External Enclosure 2.5-inch hard disk drive
$33.94
Dual 2.5 SATA-3 HDD SDD RAID 0 1 External Enclosure 2.5-inch hard disk drive pictureSerial SATA ATA RAID Data HDD Hard Drive Signal Cable Straight Right Angled 45cm
$0.29
Serial SATA ATA RAID Data HDD Hard Drive Signal Cable Straight Right Angled 45cm pictureIBM ServeRAID MR10i SAS / SATA PCI-E Raid Controller + BBU - 43W4297 / 43W4342
$23.89
IBM ServeRAID MR10i SAS / SATA PCI-E Raid Controller + BBU - 43W4297 / 43W4342 picture


Discussions

No Discussions have been posted on this vulnerability.