|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN246-1 : imagemagick vulnerabilities Vulnerability Assessment Details
|
USN246-1 : imagemagick vulnerabilities |
||
imagemagick vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - imagemagick - libmagick++6 - libmagick++6-dev - libmagick++6c2 - libmagick6 - libmagick6-dev - perlmagick Description : Florian Weimer discovered that the delegate code did not correctly handle file names which embed shell commands (CVE-2005-4601). Daniel Kobras found a format string vulnerability in the SetImageInfo() function (CVE-2006-0082). By tricking a user into processing an image file with a specially crafted file name, these two vulnerabilities could be exploited to execute arbitrary commands with the user's rights. These vulnerability become particularly critical if malicious images are sent as email attachments and the email client uses imagemagick to convert/display the images (e. g. Thunderbird and Gnus). In addition, Eero Häkkinen reported a bug in the command line argument processing of the 'display' command. Arguments that contained wildcards and were expanded to several files could trigger a heap overflow. However, there is no known possiblity to exploit this remotely. (http://bugs.debian.org/345595) Solution : Upgrade to : - imagemagick-6.2.3.4-1ubuntu1.1 (Ubuntu 5.10) - libmagick++6-6.0.6.2-2.1ubuntu1.2 (Ubuntu 5.04) - libmagick++6-dev-6.2.3.4-1ubuntu1.1 (Ubuntu 5.10) - libmagick++6c2-6.2.3.4-1ubuntu1.1 (Ubuntu 5.10) - libmagick6-6.2.3.4-1ubuntu1.1 (Ubuntu 5.10) - libmagick6-dev-6.2.3.4-1ubuntu1.1 (Ubuntu 5.10) - perlmagick-6.2.3.4-1ubuntu1.1 (Ubuntu 5.10) Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
Atari 600 XL Vintage Home Computer - New in Box, Unused
$200.00
Vintage Atari 800XL Computer With Original Box
$140.00
Vintage Family owned Atari 1200xl computer sold as is tested turns on with cable
$299.99
Atari Power Cube 800XL, 600XL, 65XE, 130XE USB-C Power Supply PSU
$11.25
A8picoCart Atari 130 / 65 XE 800 / 1200 XL XEGS multicart UnoCart clone game
$32.95
Vintage Atari 800XL ~ Home Computer in Original Box ~ Tested and Working
$149.90
Atari 520 1040 ST Astra Systems 4 Meg Computer Memory Card 4MB
$59.00
ATARI XE Keyboard Membrane Replacement - NEW
$39.99
Ms. Pac-Man Game Cartridge Atari TI99/4A TI-99/4A 1983 MS PACMAN UNTESTED/AS IS
$21.24
$225.00
|
||
No Discussions have been posted on this vulnerability. |