Lucene search

K
centosCentOS ProjectCESA-2005:413
HistoryMay 25, 2005 - 10:46 p.m.

ImageMagick security update

2005-05-2522:46:09
CentOS Project
lists.centos.org
43

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.028 Low

EPSS

Percentile

90.7%

CentOS Errata and Security Advisory CESA-2005:413

ImageMagick™ is an image display and manipulation tool for the X Window
System which can read and write multiple image formats.

A heap based buffer overflow bug was found in the way ImageMagick parses
PNM files. An attacker could execute arbitrary code on a victim’s machine
if they were able to trick the victim into opening a specially crafted PNM
file. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-1275 to this issue.

Users of ImageMagick should upgrade to these updated packages, which
contain a backported patch, and are not vulnerable to this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-May/073920.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073921.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073925.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073926.html

Affected packages:
ImageMagick
ImageMagick-c++
ImageMagick-c+±devel
ImageMagick-devel
ImageMagick-perl

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:413

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.028 Low

EPSS

Percentile

90.7%