6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
imagemagick is vulnerable to arbitrary code execution. The vulnerability exists as a heap-based buffer overflow flaw was found in ImageMagickβs processing of certain malformed PCX images. If a victim opened a specially-crafted PCX file, an attacker could possibly execute arbitrary code on the victimβs machine.
CPE | Name | Operator | Version |
---|---|---|---|
imagemagick | eq | 6.2.8.0__3.el5.4 | |
imagemagick | eq | 6.2.8.0__3.el5.4 |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=413034
lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
osvdb.org/43213
secunia.com/advisories/29786
secunia.com/advisories/29857
secunia.com/advisories/30967
secunia.com/advisories/36260
secunia.com/advisories/55721
security.gentoo.org/glsa/glsa-201311-10.xml
www.debian.org/security/2009/dsa-1858
www.mandriva.com/security/advisories?name=MDVSA-2008:099
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2008-0145.html
www.redhat.com/support/errata/RHSA-2008-0165.html
www.securityfocus.com/bid/28822
www.securitytracker.com/id?1019881
access.redhat.com/errata/RHSA-2008:0145
bugzilla.redhat.com/show_bug.cgi?id=285861
exchange.xforce.ibmcloud.com/vulnerabilities/41193
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11237