summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-200705-13.xml
blob: 95f1a64fa4c6b32de021e33346050261e4014abb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200705-13">
  <title>ImageMagick: Multiple buffer overflows</title>
  <synopsis>
    Multiple integer overflows have been discovered in ImageMagick allowing for
    the execution of arbitrary code.
  </synopsis>
  <product type="ebuild">imagemagick</product>
  <announced>2007-05-10</announced>
  <revised count="02">2007-06-07</revised>
  <bug>152672</bug>
  <bug>159567</bug>
  <bug>173186</bug>
  <access>remote</access>
  <affected>
    <package name="media-gfx/imagemagick" auto="yes" arch="*">
      <unaffected range="ge">6.3.3</unaffected>
      <vulnerable range="lt">6.3.3</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    ImageMagick is a collection of tools allowing various manipulations on
    image files.
    </p>
  </background>
  <description>
    <p>
    iDefense Labs has discovered multiple integer overflows in ImageMagick
    in the functions ReadDCMImage() and ReadXWDImage(), that are used to
    process DCM and XWD files.
    </p>
  </description>
  <impact type="normal">
    <p>
    An attacker could entice a user to open specially crafted XWD or DCM
    file, resulting in heap-based buffer overflows and possibly the
    execution of arbitrary code with the privileges of the user running
    ImageMagick. Note that this user may be httpd or any other account used
    by applications relying on the ImageMagick tools to automatically
    process images.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All ImageMagick users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.3"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797">CVE-2007-1797</uri>
  </references>
  <metadata tag="requester" timestamp="2007-04-30T13:08:15Z">
    jaervosz
  </metadata>
  <metadata tag="bugReady" timestamp="2007-05-01T19:04:55Z">
    jaervosz
  </metadata>
  <metadata tag="submitter" timestamp="2007-05-06T21:19:41Z">
    p-y
  </metadata>
</glsa>