ID CVE-2007-1797
Summary Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
References
Vulnerable Configurations
  • ImageMagick 6.3.0.0
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.0
  • ImageMagick 6.3.0.1
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.1
  • ImageMagick 6.3.0.2
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.2
  • ImageMagick 6.3.0.3
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.3
  • ImageMagick 6.3.0.4
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.4
  • ImageMagick 6.3.0.5
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.5
  • ImageMagick 6.3.0.7
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.7
  • ImageMagick 6.3.0.8
    cpe:2.3:a:imagemagick:imagemagick:6.3.0.8
  • ImageMagick 6.3.1.0
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.0
  • ImageMagick 6.3.1.1
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.1
  • ImageMagick 6.3.1.2.
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.2.
  • ImageMagick 6.3.1.3
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.3
  • ImageMagick 6.3.1.4
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.4
  • ImageMagick 6.3.1.5
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.5
  • ImageMagick 6.3.1.6
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.6
  • ImageMagick 6.3.1.7
    cpe:2.3:a:imagemagick:imagemagick:6.3.1.7
  • ImageMagick 6.3.2.0
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.0
  • ImageMagick 6.3.2.1
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.1
  • ImageMagick 6.3.2.2
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.2
  • ImageMagick 6.3.2.3
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.3
  • ImageMagick 6.3.2.4
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.4
  • ImageMagick 6.3.2.5
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.5
  • ImageMagick 6.3.2.6
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.6
  • ImageMagick 6.3.2.7
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.7
  • ImageMagick 6.3.2.8
    cpe:2.3:a:imagemagick:imagemagick:6.3.2.8
  • ImageMagick 6.3.3.0
    cpe:2.3:a:imagemagick:imagemagick:6.3.3.0
  • ImageMagick 6.3.3.1
    cpe:2.3:a:imagemagick:imagemagick:6.3.3.1
  • ImageMagick 6.3.3.2
    cpe:2.3:a:imagemagick:imagemagick:6.3.3.2
  • ImageMagick 6.3.3.3
    cpe:2.3:a:imagemagick:imagemagick:6.3.3.3
  • ImageMagick 6.3.3.4
    cpe:2.3:a:imagemagick:imagemagick:6.3.3.4
CVSS
Base: 6.8 (as of 03-04-2007 - 08:59)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200705-13.NASL
    description The remote host is affected by the vulnerability described in GLSA-200705-13 (ImageMagick: Multiple buffer overflows) iDefense Labs has discovered multiple integer overflows in ImageMagick in the functions ReadDCMImage() and ReadXWDImage(), that are used to process DCM and XWD files. Impact : An attacker could entice a user to open specially crafted XWD or DCM file, resulting in heap-based buffer overflows and possibly the execution of arbitrary code with the privileges of the user running ImageMagick. Note that this user may be httpd or any other account used by applications relying on the ImageMagick tools to automatically process images. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 25209
    published 2007-05-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25209
    title GLSA-200705-13 : ImageMagick: Multiple buffer overflows
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2007-147.NASL
    description A number of vulnerabilities were discovered in how ImageMagick handles DCM and XWD image files. If a user were tricked into processing a specially crafted image file with an application that uses ImageMagick, an attacker could cause a heap-based buffer overflow and possibly execute arbitrary code with the user's privileges. The updated packages have been patched to prevent these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 25750
    published 2007-07-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=25750
    title Mandrake Linux Security Advisory : ImageMagick (MDKSA-2007:147)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_IMAGEMAGICK-3743.NASL
    description This update of ImageMagick fixes a bug in the patch for the last security update for CVE-2007-1797.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27110
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27110
    title openSUSE 10 Security Update : ImageMagick (ImageMagick-3743)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2008-0145.NASL
    description Updated ImageMagick packages that correct several security issues are now available for Red Hat Enterprise Linux versions 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) An integer overflow flaw was found in ImageMagick's DIB parsing code. If a victim opened a specially crafted DIB file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4988) A heap-based buffer overflow flaw was found in the way ImageMagick parsed XCF files. If a specially crafted XCF image was opened, ImageMagick could be made to overwrite heap memory beyond the bounds of its allocated memory. This could, potentially, allow an attacker to execute arbitrary code on the machine running ImageMagick. (CVE-2008-1096) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially crafted PCX file, an attacker could possibly execute arbitrary code on the victim's machine. (CVE-2008-1097) All users of ImageMagick should upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 31984
    published 2008-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31984
    title RHEL 3 / 4 / 5 : ImageMagick (RHSA-2008:0145)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1903.NASL
    description Several vulnerabilities have been discovered in graphicsmagick, a collection of image processing tool, which can lead to the execution of arbitrary code, exposure of sensitive information or cause DoS. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-1667 Multiple integer overflows in XInitImage function in xwd.c for GraphicsMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow. It only affects the oldstable distribution (etch). - CVE-2007-1797 Multiple integer overflows allow remote attackers to execute arbitrary code via a crafted DCM image, or the colors or comments field in a crafted XWD image. It only affects the oldstable distribution (etch). - CVE-2007-4985 A crafted image file can trigger an infinite loop in the ReadDCMImage function or in the ReadXCFImage function. It only affects the oldstable distribution (etch). - CVE-2007-4986 Multiple integer overflows allow context-dependent attackers to execute arbitrary code via a crafted .dcm, .dib, .xbm, .xcf, or .xwd image file, which triggers a heap-based buffer overflow. It only affects the oldstable distribution (etch). - CVE-2007-4988 A sign extension error allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow. It affects only the oldstable distribution (etch). - CVE-2008-1096 The load_tile function in the XCF coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write. It affects only oldstable (etch). - CVE-2008-3134 Multiple vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via vectors in the AVI, AVS, DCM, EPT, FITS, MTV, PALM, RLA, and TGA decoder readers; and the GetImageCharacteristics function in magick/image.c, as reachable from a crafted PNG, JPEG, BMP, or TIFF file. - CVE-2008-6070 Multiple heap-based buffer underflows in the ReadPALMImage function in coders/palm.c in GraphicsMagick before 1.2.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted PALM image. - CVE-2008-6071 Heap-based buffer overflow in the DecodeImage function in coders/pict.c in GraphicsMagick before 1.1.14, and 1.2.x before 1.2.3, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted PICT image. - CVE-2008-6072 Multiple vulnerabilities in GraphicsMagick allow remote attackers to cause a denial of service (crash) via vectors in XCF and CINEON images. - CVE-2008-6621 Vulnerability in GraphicsMagick allows remote attackers to cause a denial of service (crash) via vectors in DPX images. - CVE-2009-1882 Integer overflow allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 44768
    published 2010-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44768
    title Debian DSA-1903-1 : graphicsmagick - several vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_IMAGEMAGICK-3737.NASL
    description This update of ImageMagick fixes a bug in the patch for the last security update for CVE-2007-1797.
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 29352
    published 2007-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29352
    title SuSE 10 Security Update : ImageMagick (ZYPP Patch Number 3737)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_IMAGEMAGICK-3448.NASL
    description This update of ImageMagick fixes a bug in the patch for the last security update for CVE-2007-1797.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27109
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27109
    title openSUSE 10 Security Update : ImageMagick (ImageMagick-3448)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2008-0165.NASL
    description Updated ImageMagick packages that correct several security issues are now available for Red Hat Enterprise Linux version 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially crafted PCX file, an attacker could possibly execute arbitrary code with the privileges of the user running ImageMagick.. (CVE-2008-1097) All users of ImageMagick should upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 31985
    published 2008-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31985
    title RHEL 2.1 : ImageMagick (RHSA-2008:0165)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_GRAPHICSMAGICK-3129.NASL
    description This update of GraphicsMagick fixes three integer overflow in DCM and XWD code. These bugs can be exploited remotely via other application. (CVE-2007-1667,CVE-2007-1797)
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27103
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27103
    title openSUSE 10 Security Update : GraphicsMagick (GraphicsMagick-3129)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2007-1340.NASL
    description Maintainance update fixing several security issues and bugs. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 27710
    published 2007-11-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27710
    title Fedora 7 : GraphicsMagick-1.1.8-2.fc7 (2007-1340)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20080416_IMAGEMAGICK_ON_SL3_X.NASL
    description Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) An integer overflow flaw was found in ImageMagick's DIB parsing code. If a victim opened a specially crafted DIB file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4988) A heap-based buffer overflow flaw was found in the way ImageMagick parsed XCF files. If a specially crafted XCF image was opened, ImageMagick could be made to overwrite heap memory beyond the bounds of its allocated memory. This could, potentially, allow an attacker to execute arbitrary code on the machine running ImageMagick. (CVE-2008-1096) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially crafted PCX file, an attacker could possibly execute arbitrary code on the victim's machine. (CVE-2008-1097)
    last seen 2019-02-21
    modified 2019-01-07
    plugin id 60382
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60382
    title Scientific Linux Security Update : ImageMagick on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_IMAGEMAGICK-3131.NASL
    description This update of ImageMagick fixes three integer overflow in DCM and XWD code. These bugs can be exploited remotely via other application. (CVE-2007-1667 / CVE-2007-1797)
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 29351
    published 2007-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=29351
    title SuSE 10 Security Update : ImageMagick (ZYPP Patch Number 3131)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1858.NASL
    description Several vulnerabilities have been discovered in the imagemagick image manipulation programs which can lead to the execution of arbitrary code, exposure of sensitive information or cause DoS. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-1667 Multiple integer overflows in XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow. It only affects the oldstable distribution (etch). - CVE-2007-1797 Multiple integer overflows allow remote attackers to execute arbitrary code via a crafted DCM image, or the colors or comments field in a crafted XWD image. It only affects the oldstable distribution (etch). - CVE-2007-4985 A crafted image file can trigger an infinite loop in the ReadDCMImage function or in the ReadXCFImage function. It only affects the oldstable distribution (etch). - CVE-2007-4986 Multiple integer overflows allow context-dependent attackers to execute arbitrary code via a crafted .dcm, .dib, .xbm, .xcf, or .xwd image file, which triggers a heap-based buffer overflow. It only affects the oldstable distribution (etch). - CVE-2007-4987 Off-by-one error allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address. It affects only the oldstable distribution (etch). - CVE-2007-4988 A sign extension error allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow. It affects only the oldstable distribution (etch). - CVE-2008-1096 The load_tile function in the XCF coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write. It affects only to oldstable (etch). - CVE-2008-1097 Heap-based buffer overflow in the PCX coder allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption. It affects only to oldstable (etch). - CVE-2009-1882 Integer overflow allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 44723
    published 2010-02-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=44723
    title Debian DSA-1858-1 : imagemagick - multiple vulnerabilities
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-481-1.NASL
    description Multiple vulnerabilities were found in ImageMagick's handling of DCM and WXD image files. By tricking a user into processing a specially crafted image with an application that uses imagemagick, an attacker could execute arbitrary code with the user's privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 28082
    published 2007-11-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=28082
    title Ubuntu 6.06 LTS / 6.10 / 7.04 : imagemagick vulnerabilities (USN-481-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2008-0145.NASL
    description Updated ImageMagick packages that correct several security issues are now available for Red Hat Enterprise Linux versions 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) An integer overflow flaw was found in ImageMagick's DIB parsing code. If a victim opened a specially crafted DIB file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4988) A heap-based buffer overflow flaw was found in the way ImageMagick parsed XCF files. If a specially crafted XCF image was opened, ImageMagick could be made to overwrite heap memory beyond the bounds of its allocated memory. This could, potentially, allow an attacker to execute arbitrary code on the machine running ImageMagick. (CVE-2008-1096) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially crafted PCX file, an attacker could possibly execute arbitrary code on the victim's machine. (CVE-2008-1097) All users of ImageMagick should upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 31995
    published 2008-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31995
    title CentOS 3 / 4 / 5 : ImageMagick (CESA-2008:0145)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_IMAGEMAGICK-3130.NASL
    description This update of ImageMagick fixes three integer overflow in DCM and XWD code. These bugs can be exploited remotely via other application. (CVE-2007-1667,CVE-2007-1797)
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27108
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27108
    title openSUSE 10 Security Update : ImageMagick (ImageMagick-3130)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2008-0145.NASL
    description From Red Hat Security Advisory 2008:0145 : Updated ImageMagick packages that correct several security issues are now available for Red Hat Enterprise Linux versions 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Several heap-based buffer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM or XWD file, an attacker could potentially execute arbitrary code on the victim's machine. (CVE-2007-1797) Several denial of service flaws were found in ImageMagick's parsing of XCF and DCM files. Attempting to process a specially crafted input file in these formats could cause ImageMagick to enter an infinite loop. (CVE-2007-4985) Several integer overflow flaws were found in ImageMagick. If a victim opened a specially crafted DCM, DIB, XBM, XCF or XWD file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4986) An integer overflow flaw was found in ImageMagick's DIB parsing code. If a victim opened a specially crafted DIB file, an attacker could potentially execute arbitrary code with the privileges of the user running ImageMagick. (CVE-2007-4988) A heap-based buffer overflow flaw was found in the way ImageMagick parsed XCF files. If a specially crafted XCF image was opened, ImageMagick could be made to overwrite heap memory beyond the bounds of its allocated memory. This could, potentially, allow an attacker to execute arbitrary code on the machine running ImageMagick. (CVE-2008-1096) A heap-based buffer overflow flaw was found in ImageMagick's processing of certain malformed PCX images. If a victim opened a specially crafted PCX file, an attacker could possibly execute arbitrary code on the victim's machine. (CVE-2008-1097) All users of ImageMagick should upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 67656
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67656
    title Oracle Linux 3 / 4 / 5 : ImageMagick (ELSA-2008-0145)
oval via4
accepted 2013-04-29T04:18:35.837-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
family unix
id oval:org.mitre.oval:def:9254
status accepted
submitted 2010-07-09T03:56:16-04:00
title Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
version 24
redhat via4
advisories
  • rhsa
    id RHSA-2008:0145
  • rhsa
    id RHSA-2008:0165
rpms
  • ImageMagick-0:5.5.6-28
  • ImageMagick-c++-0:5.5.6-28
  • ImageMagick-c++-devel-0:5.5.6-28
  • ImageMagick-devel-0:5.5.6-28
  • ImageMagick-perl-0:5.5.6-28
  • ImageMagick-0:6.0.7.1-17.el4_6.1
  • ImageMagick-c++-0:6.0.7.1-17.el4_6.1
  • ImageMagick-c++-devel-0:6.0.7.1-17.el4_6.1
  • ImageMagick-devel-0:6.0.7.1-17.el4_6.1
  • ImageMagick-perl-0:6.0.7.1-17.el4_6.1
  • ImageMagick-0:6.2.8.0-4.el5_1.1
  • ImageMagick-c++-0:6.2.8.0-4.el5_1.1
  • ImageMagick-c++-devel-0:6.2.8.0-4.el5_1.1
  • ImageMagick-devel-0:6.2.8.0-4.el5_1.1
  • ImageMagick-perl-0:6.2.8.0-4.el5_1.1
refmap via4
bid
  • 23252
  • 23347
confirm
debian DSA-1858
gentoo GLSA-200705-13
idefense 20070331 Multiple Vendor ImageMagick DCM and XWD Buffer Overflow Vulnerabilities
mandriva MDKSA-2007:147
misc http://www.imagemagick.org/script/changelog.php
sectrack 1017839
secunia
  • 24721
  • 24739
  • 25072
  • 25206
  • 25992
  • 26177
  • 29786
  • 29857
  • 36260
suse SUSE-SR:2007:008
ubuntu USN-481-1
vupen ADV-2007-1200
xf
  • imagemagick-readdcmimage-bo(33376)
  • imagemagick-readxwdimage-bo(33377)
Last major update 07-03-2011 - 21:52
Published 02-04-2007 - 18:19
Last modified 10-10-2017 - 21:31
Back to Top