Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows


Vulnerability Assessment Details

[GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Vulnerability Assessment Summary
ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-12
(ImageMagick, imlib, imlib2: BMP decoding buffer overflows)


Due to improper bounds checking, ImageMagick and imlib are vulnerable to a
buffer overflow when decoding runlength-encoded bitmaps. This bug can be
exploited using a specially-crafted BMP image and could potentially permit
remote code execution when this image is decoded by the user.

Impact

A specially-crafted runlength-encoded BMP could lead ImageMagick and imlib
to crash or potentially execute arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0802
http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html
http://securitytracker.com/alerts/2004/Aug/1011104.html
http://securitytracker.com/alerts/2004/Aug/1011105.html


Solution:
All ImageMagick users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
# emerge ">=media-gfx/imagemagick-6.0.7.1"
All imlib users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib-1.9.14-r2"
# emerge ">=media-libs/imlib-1.9.14-r2"
All imlib2 users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib2-1.1.2"
# emerge ">=media-libs/imlib2-1.1.2"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

HP 8212-92G-Poe(3xJ9534A 1xJ9536 2xJ9306A) Switch J9639A Factory Renew 99yr Wty
$6500.0
HP 8212-92G-Poe(3xJ9534A 1xJ9536 2xJ9306A) Switch J9639A Factory Renew 99yr Wty pictureCisco WS-6006 Series Chassis w/ WS-X6K-SUP2-2GE WS-X6516-GBIC Local Pickup
$299.99
Cisco WS-6006 Series Chassis w/ WS-X6K-SUP2-2GE WS-X6516-GBIC Local Pickup pictureCISCO WS-X6416-GBIC 6000/6500 16port GigEthernet Mod. Req. GBICs
$20.0
CISCO WS-X6416-GBIC     6000/6500 16port GigEthernet Mod. Req. GBICs pictureDell PowerConnect 5424 24-Port Managed Switch - TESTED - Ships Today
$49.98
Dell PowerConnect 5424 24-Port Managed Switch - TESTED - Ships Today picture


Discussions

No Discussions have been posted on this vulnerability.