Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows


Vulnerability Assessment Details

[GLSA-200409-12] ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Vulnerability Assessment Summary
ImageMagick, imlib, imlib2: BMP decoding buffer overflows

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-12
(ImageMagick, imlib, imlib2: BMP decoding buffer overflows)


Due to improper bounds checking, ImageMagick and imlib are vulnerable to a
buffer overflow when decoding runlength-encoded bitmaps. This bug can be
exploited using a specially-crafted BMP image and could potentially permit
remote code execution when this image is decoded by the user.

Impact

A specially-crafted runlength-encoded BMP could lead ImageMagick and imlib
to crash or potentially execute arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0802
http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html
http://securitytracker.com/alerts/2004/Aug/1011104.html
http://securitytracker.com/alerts/2004/Aug/1011105.html


Solution:
All ImageMagick users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
# emerge ">=media-gfx/imagemagick-6.0.7.1"
All imlib users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib-1.9.14-r2"
# emerge ">=media-libs/imlib-1.9.14-r2"
All imlib2 users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-libs/imlib2-1.1.2"
# emerge ">=media-libs/imlib2-1.1.2"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

IBM BladeCenter H Accessories - 49Y6315, 32R1869 X 2, 80Y9081 - Lot of 4 Item
$150.0
IBM BladeCenter H  Accessories -  49Y6315, 32R1869 X 2, 80Y9081 -  Lot of 4 Item pictureDell PowerEdge R630 2x E5-2660v3 2.6GHz 10 Core 128GB, 8x 1.2TB 10K 12Gb/s, H730
$5950.0
Dell PowerEdge R630 2x E5-2660v3 2.6GHz 10 Core 128GB, 8x 1.2TB 10K 12Gb/s, H730 pictureHynix 32GB (8x4GB) 2Rx8 PC3-10600E DDR3 1333Mhz 240Pin ECC Unbuffered Server RAM
$320.0
Hynix 32GB (8x4GB) 2Rx8 PC3-10600E DDR3 1333Mhz 240Pin ECC Unbuffered Server RAM pictureHynix 16GB (4x4GB) 2Rx8 PC3-10600E DDR3 1333Mhz 240Pin ECC Unbuffered Server RAM
$130.0
Hynix 16GB (4x4GB) 2Rx8 PC3-10600E DDR3 1333Mhz 240Pin ECC Unbuffered Server RAM picture


Discussions

No Discussions have been posted on this vulnerability.