SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ImageMagick Vendors:   ImageMagick.org
(Slackware Issues Fix for imagemagick) libpng Buffer Overflows May Let Remote Users Crash the Application or Execute Arbitrary Code
SecurityTracker Alert ID:  1010923
SecurityTracker URL:  http://securitytracker.com/id/1010923
CVE Reference:   CVE-2004-0597, CVE-2004-0598, CVE-2004-0599   (Links to External Site)
Date:  Aug 11 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several buffer overflow vulnerabilities were reported in libpng. A remote user may be able to execute arbitrary code on the target system. Imagemagick is affected.

Red Hat reported that Chris Evans discovered several buffer overflows in libpng during a code audit.

A remote user can create a specially crafted PNG file that, when opened by a target user with an application that uses libpng, will execute arbitrary code on the target user's system [CVE: CVE-2004-0597].

A NULL pointer dereference vulnerability [CVE: CVE-2004-0598] and several integer overflow issues [CVE: CVE-2004-0599] were also reported to be able to cause an affected application to crash when opening a malicious file.

Impact:   A remote user may be able to cause an affected application to crash or execute arbitrary code. The specific impact depends on the application using libpng.
Solution:   Slackware has released a fix for imagemagick, which is affected by the libpng vulnerability.

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/imagemagick-5.5.7_25-i486-1.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/imagemagick-6.0.4_3-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/imagemagick-6.0.4_3-i486-1.tgz


The MD5 signatures are:

Slackware 9.1 package:
52903d349dcbaf3be88d19c8aa05dbbf imagemagick-5.5.7_25-i486-1.tgz

Slackware 10.0 package:
ad5531a33331029dcc7013b72f8ec792 imagemagick-6.0.4_3-i486-1.tgz

Slackware -current package:
ad5531a33331029dcc7013b72f8ec792 imagemagick-6.0.4_3-i486-1.tgz

Vendor URL:  www.imagemagick.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Slackware)
Underlying OS Comments:  9.1, 10.0, and -current

Message History:   This archive entry is a follow-up to the message listed below.
Aug 4 2004 libpng Buffer Overflows May Let Remote Users Crash the Application or Execute Arbitrary Code



 Source Message Contents

Subject:  [slackware-security] imagemagick (SSA:2004-223-02)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  imagemagick (SSA:2004-223-02)

New imagemagick packages are available for Slackware 9.1, 10.0,
and -current to fix security issues with PNG images.

More details about the issues with PNG may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599

Here are the details from the Slackware 10.0 ChangeLog:
+--------------------------+
Sat Aug  7 17:17:20 AKDT 2004
patches/packages/imagemagick-6.0.4_3-i486-1.tgz:  Upgraded to
  ImageMagick-6.0.4-3.  Fixes PNG security issues.
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/imagemagick-5.5.7_25-i486-1.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/imagemagick-6.0.4_3-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/imagemagick-6.0.4_3-i486-1.tgz


MD5 signatures:
+-------------+

Slackware 9.1 package:
52903d349dcbaf3be88d19c8aa05dbbf  imagemagick-5.5.7_25-i486-1.tgz

Slackware 10.0 package:
ad5531a33331029dcc7013b72f8ec792  imagemagick-6.0.4_3-i486-1.tgz

Slackware -current package:
ad5531a33331029dcc7013b72f8ec792  imagemagick-6.0.4_3-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg imagemagick-6.0.4_3-i486-1.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBGT4UakRjwEAQIjMRAtV0AJ0a4jx/l66LtE5/qWzUzZI4FWb0cQCeNiO4
amqRCRyiMmddod2woZgjvuc=
=7WlY
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC