SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   ImageMagick Vendors:   ImageMagick.org
ImageMagick SetImageInfo() Format String Bug May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015623
SecurityTracker URL:  http://securitytracker.com/id/1015623
CVE Reference:   CVE-2006-0082   (Links to External Site)
Date:  Feb 14 2006
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network


Description:   A vulnerability was reported in ImageMagick. A remote user may be able to cause arbitrary code to be executed on the target user's system.

The SetImageInfo() function in 'image.c' contains a format string vulnerability. A remote user can create a specially named file that contains format string characters. When the file is processed (using the convert program, for example), arbitrary code may be executed with the privileges of the user running ImageMagick.

Daniel Kobras discovered this vulnerability.

Impact:   A remote user can create a specially named file that, when processed by ImageMagick, may execute arbitrary code with the privileges of the target user.
Solution:   No upstream solution was available at the time of this entry.
Vendor URL:  www.imagemagick.org/ (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 14 2006 (Red Hat Issues Fix) ImageMagick SetImageInfo() Format String Bug May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 2.1, 3, and 4.
Feb 1 2008 (Sun Issues Fix) ImageMagick SetImageInfo() Format String Bug May Let Remote Users Execute Arbitrary Code
Sun has issued a fix for Solaris 9 and 10.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC