You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

74 lines
2.3 KiB

<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
<?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200705-13">
<title>ImageMagick: Multiple buffer overflows</title>
<synopsis>
Multiple integer overflows have been discovered in ImageMagick allowing for
the execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
<announced>May 10, 2007</announced>
<revised>June 07, 2007: 02</revised>
<bug>152672</bug>
<bug>159567</bug>
<bug>173186</bug>
<access>remote</access>
<affected>
<package name="media-gfx/imagemagick" auto="yes" arch="*">
<unaffected range="ge">6.3.3</unaffected>
<vulnerable range="lt">6.3.3</vulnerable>
</package>
</affected>
<background>
<p>
ImageMagick is a collection of tools allowing various manipulations on
image files.
</p>
</background>
<description>
<p>
iDefense Labs has discovered multiple integer overflows in ImageMagick
in the functions ReadDCMImage() and ReadXWDImage(), that are used to
process DCM and XWD files.
</p>
</description>
<impact type="normal">
<p>
An attacker could entice a user to open specially crafted XWD or DCM
file, resulting in heap-based buffer overflows and possibly the
execution of arbitrary code with the privileges of the user running
ImageMagick. Note that this user may be httpd or any other account used
by applications relying on the ImageMagick tools to automatically
process images.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All ImageMagick users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.3&quot;</code>
</resolution>
<references>
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797">CVE-2007-1797</uri>
</references>
<metadata tag="requester" timestamp="Mon, 30 Apr 2007 13:08:15 +0000">
jaervosz
</metadata>
<metadata tag="bugReady" timestamp="Tue, 01 May 2007 19:04:55 +0000">
jaervosz
</metadata>
<metadata tag="submitter" timestamp="Sun, 06 May 2007 21:19:41 +0000">
p-y
</metadata>
</glsa>