Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200505-16] ImageMagick, GraphicsMagick: Denial of Service vulnerability


Vulnerability Assessment Details

[GLSA-200505-16] ImageMagick, GraphicsMagick: Denial of Service vulnerability

Vulnerability Assessment Summary
ImageMagick, GraphicsMagick: Denial of Service vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200505-16
(ImageMagick, GraphicsMagick: Denial of Service vulnerability)


Tavis Ormandy of the Gentoo Linux Security Audit Team discovered a
Denial of Service vulnerability in the XWD decoder of ImageMagick and
GraphicsMagick when setting a color mask to zero.

Impact

A remote attacker could submit a specially crafted image to a user
or an automated system making use of an affected utility, resulting in
a Denial of Service by consumption of CPU time.

Workaround

There is no known workaround at this time.


Solution:
All ImageMagick users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.2.3"
All GraphicsMagick users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.6-r1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi


Warning: mysql_connect(): Too many connections in /home/vscan/public_html/store/select.php on line 4

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 5

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 13


Cisco CP-8821-K9 Wireless IP VoIP Phone WITH BATTERY picture

Cisco CP-8821-K9 Wireless IP VoIP Phone WITH BATTERY

$194.99



"LOT OF 4" Cisco CP-8841 IP Phone Color VoIP PoE CP-8841-K9 w/Stand TESTED

$77.99



Cisco CP-7961G VoIP PoE Business Desk Phone picture

Cisco CP-7961G VoIP PoE Business Desk Phone

$21.00



Yealink W56H HD DECT Expansion Handset for Cordless VoIP Phone picture

Yealink W56H HD DECT Expansion Handset for Cordless VoIP Phone

$65.69



GRANDSTREAM HT802 2 PORT FXS ANALOG VOIP PHONE TELEPHONE ADAPTER WORKING *READ picture

GRANDSTREAM HT802 2 PORT FXS ANALOG VOIP PHONE TELEPHONE ADAPTER WORKING *READ

$21.17



Unlocked Cisco / Linksys SPA2102 VoIP 2FXS Phone Adapter with Router picture

Unlocked Cisco / Linksys SPA2102 VoIP 2FXS Phone Adapter with Router

$17.99



MagicJack - HOME VoIP Telephone Adapter  - Black (read Description) picture

MagicJack - HOME VoIP Telephone Adapter - Black (read Description)

$19.99



Linksys Phone Adapter Vonage with 2 Port Voice Over IP VOIP PAP2 Factory Sealed picture

Linksys Phone Adapter Vonage with 2 Port Voice Over IP VOIP PAP2 Factory Sealed

$22.25



Grandstream GS-HT802 2 Port Analog Telephone Adapter VoIP Phone & Device, Black picture

Grandstream GS-HT802 2 Port Analog Telephone Adapter VoIP Phone & Device, Black

$29.99



Cisco 7925 Wireless IP Phone Wi-Fi VOIP CP-7925G-A-K9 picture

Cisco 7925 Wireless IP Phone Wi-Fi VOIP CP-7925G-A-K9

$29.89



Discussions

No Discussions have been posted on this vulnerability.