SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   ImageMagick Vendors:   ImageMagick.org
(Oracle Issues Fix for Oracle Linux) ImageMagick popen() File Open Feature Lets Remote Users Execute Arbitrary Commands on the Target System
SecurityTracker Alert ID:  1036120
SecurityTracker URL:  http://securitytracker.com/id/1036120
CVE Reference:   CVE-2016-5118   (Links to External Site)
Date:  Jun 17 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in ImageMagick. A remote user can execute arbitrary commands on the target system in certain cases.

A remote user can supply a specially crafted filename string that, when processed by the target application using ImageMagick, will execute arbitrary shell commands contained in the filename string. The commands will run with the privileges of the target application using the ImageMagick library.

A string with a pipe character ('|') as the first character can trigger this flaw.

The flaw can be exploited, for example, via a specially crafted SVG xlink:href attribute value.

A demonstration exploit command line sequence is provided:

rm -f hello.txt
convert '|echo Hello > hello.txt;' null:
ls hello.txt

Bob Friesenhahn of the GraphicsMagick project reported this vulnerability.

Impact:   A remote user can execute arbitrary commands on the target system in certain cases.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-1237.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-1237.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
May 30 2016 ImageMagick popen() File Open Feature Lets Remote Users Execute Arbitrary Commands on the Target System



 Source Message Contents

Subject:  [El-errata] ELSA-2016-1237 Important: Oracle Linux 7 ImageMagick security update

Oracle Linux Security Advisory ELSA-2016-1237

http://linux.oracle.com/errata/ELSA-2016-1237.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
ImageMagick-6.7.8.9-15.el7_2.i686.rpm
ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm
ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm
ImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpm
ImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpm
ImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm
ImageMagick-devel-6.7.8.9-15.el7_2.i686.rpm
ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm
ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm
ImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/ImageMagick-6.7.8.9-15.el7_2.src.rpm



Description of changes:

[6.7.8.9-15]
- Added fix for CVE-2016-5118, CVE-2016-5240, rhbz#1269562,
   rhbz#1326834, rhbz#1334188, rhbz#1269553


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC