|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:065: ImageMagick Vulnerability Assessment Details
|
MDKSA-2005:065: ImageMagick |
||
Check for the version of the ImageMagick package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory MDKSA-2005:065 (ImageMagick). A format string vulnerability was discovered in ImageMagick, in the way it handles filenames. A possible hacker could execute arbitrary code on a victim's machine provided they could trick them into opening a file with a special name (CVE-2005-0397). As well, Andrei Nigmatulin discovered a heap-based buffer overflow in ImageMagick's image handler. A possible hacker could create a special PhotoShop Document (PSD) image file in such a way that it would cause ImageMagick to execute arbitray code when processing the image (CVE-2005-0005). Other vulnerabilities were discovered in ImageMagick versions prior to 6.0: A bug in the way that ImageMagick handles TIFF tags was discovered. It was possible that a TIFF image with an invalid tag could cause ImageMagick to crash (CVE-2005-0759). A bug in ImageMagick's TIFF decoder was discovered where a specially- crafted TIFF image could cause ImageMagick to crash (CVE-2005-0760). A bug in ImageMagick's PSD parsing was discovered where a specially- crafted PSD file could cause ImageMagick to crash (CVE-2005-0761). Finally, a heap overflow bug was discovered in ImageMagick's SGI parser. If an attacker could trick a user into opening a specially- crafted SGI image file, ImageMagick would execute arbitrary code (CVE-2005-0762). The updated packages have been patched to correct these issues. Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:065 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID
$58.99
EMC (HUSMR3216ASS204) 1.6TB SSD SAS 12Gbps WISolid State Drive - 118000315-02
$149.99
Western Digital 250GB WD Blue SA510 SATA SSD, Internal M.2 2280 - WDS250G3B0B
$39.99
SanDisk 2TB Ultra 3D NAND SSD, Internal Solid State Drive - SDSSDH3-2T00-G26
$149.99
Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot
$13.99
M.2 SATA SSD 256GB Double Notch with Windows 11 Installed Lot
$14.95
Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot
$13.99
1x 480GB SATA SSD Generic Intel 2.5" Enterprise SSD Drive 6Gbps
$29.00
Fanxiang SSD 512GB 1TB 2TB 4TB 2.5''SATA III Internal Solid State Hard Drive LOT
$188.99
4 TB SSD SATA III Drive 2.5" Solid State Drive SATAIII 6Gb/s UP to 540MB/s
$149.00
|
||
No Discussions have been posted on this vulnerability. |