LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Updated ImageMagick packages fix vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:193
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : ImageMagick
 Date    : October 30, 2006
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 Multiple buffer overflows in GraphicsMagick before 1.1.7 and
 ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of
 service and possibly execute execute arbitrary code via (1) a DCM image
 that is not properly handled by the ReadDCMImage function in
 coders/dcm.c, or (2) a PALM image that is not properly handled by the
 ReadPALMImage function in coders/palm.c.

 Updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 9cff2af0f77ac36aa384c7c4514f36f0  2006.0/i586/ImageMagick-6.2.4.3-1.3.20060mdk.i586.rpm
 8405ecc145ef62333e6b4e786c3c140e  2006.0/i586/ImageMagick-doc-6.2.4.3-1.3.20060mdk.i586.rpm
 296450899da34bbde2d56e5259686d96  2006.0/i586/libMagick8.4.2-6.2.4.3-1.3.20060mdk.i586.rpm
 bc576e4aa2425b60d38c97d783c982c0  2006.0/i586/libMagick8.4.2-devel-6.2.4.3-1.3.20060mdk.i586.rpm
 2154b0021e296482ea3e3d8880559dcb  2006.0/i586/perl-Image-Magick-6.2.4.3-1.3.20060mdk.i586.rpm 
 5302895646e0bccbe9c0c5c1f4e11cec  2006.0/SRPMS/ImageMagick-6.2.4.3-1.3.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 37c26759a68c17030f75043060cfc2b4  2006.0/x86_64/ImageMagick-6.2.4.3-1.3.20060mdk.x86_64.rpm
 4f88d24083c634afe7860e24075151ca  2006.0/x86_64/ImageMagick-doc-6.2.4.3-1.3.20060mdk.x86_64.rpm
 274785820d8543a27aa254ff6a086ef2  2006.0/x86_64/lib64Magick8.4.2-6.2.4.3-1.3.20060mdk.x86_64.rpm
 02a7e7432374fcb5ace201bab9a6e1d7  2006.0/x86_64/lib64Magick8.4.2-devel-6.2.4.3-1.3.20060mdk.x86_64.rpm
 ac8846ce3a292e4b1ffc791c10a20a74  2006.0/x86_64/perl-Image-Magick-6.2.4.3-1.3.20060mdk.x86_64.rpm 
 5302895646e0bccbe9c0c5c1f4e11cec  2006.0/SRPMS/ImageMagick-6.2.4.3-1.3.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 259fc249b1dbbf6c58257b6908532140  2007.0/i586/ImageMagick-6.2.9.2-1.1mdv2007.0.i586.rpm
 c8ff934b06f802278f7bcd3c9d3bab96  2007.0/i586/ImageMagick-doc-6.2.9.2-1.1mdv2007.0.i586.rpm
 b72caa9c374ca69892255cddc521b073  2007.0/i586/libMagick10.4.0-6.2.9.2-1.1mdv2007.0.i586.rpm
 0a6d767cf14550aa8a20215e01873272  2007.0/i586/libMagick10.4.0-devel-6.2.9.2-1.1mdv2007.0.i586.rpm
 259991496195ecf4e7d75cc96f4f4235  2007.0/i586/perl-Image-Magick-6.2.9.2-1.1mdv2007.0.i586.rpm 
 5db799ea7e3150a4d124cc8468418163  2007.0/SRPMS/ImageMagick-6.2.9.2-1.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 5957de896d84e071fc73e32d184b9ff5  2007.0/x86_64/ImageMagick-6.2.9.2-1.1mdv2007.0.x86_64.rpm
 2b91a2815b70a243f99b88c62664b5dc  2007.0/x86_64/ImageMagick-doc-6.2.9.2-1.1mdv2007.0.x86_64.rpm
 92b14592306acfab456d2b6fe0c335cd  2007.0/x86_64/lib64Magick10.4.0-6.2.9.2-1.1mdv2007.0.x86_64.rpm
 779dd5bf3491a3a3fffcbe542e761d79  2007.0/x86_64/lib64Magick10.4.0-devel-6.2.9.2-1.1mdv2007.0.x86_64.rpm
 173459bbde013ce76a500b3316cac9eb  2007.0/x86_64/perl-Image-Magick-6.2.9.2-1.1mdv2007.0.x86_64.rpm 
 5db799ea7e3150a4d124cc8468418163  2007.0/SRPMS/ImageMagick-6.2.9.2-1.1mdv2007.0.src.rpm

 Corporate 3.0:
 3c3e93caa3752c6a83bf258a7c13f3dc  corporate/3.0/i586/ImageMagick-5.5.7.15-6.8.C30mdk.i586.rpm
 280341a8df9e0505ab906e8da7ad0558  corporate/3.0/i586/ImageMagick-doc-5.5.7.15-6.8.C30mdk.i586.rpm
 650c884639355e492ee879a7cfbddbc7  corporate/3.0/i586/libMagick5.5.7-5.5.7.15-6.8.C30mdk.i586.rpm
 13ccb4cb86f566cd0c811109a9dc0dd1  corporate/3.0/i586/libMagick5.5.7-devel-5.5.7.15-6.8.C30mdk.i586.rpm
 48035e977de33e09b908a3f512f94e72  corporate/3.0/i586/perl-Magick-5.5.7.15-6.8.C30mdk.i586.rpm 
 c7894af769352505f059b0e16b9a34cc  corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.8.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 a096885d2bcaa9820c17e1a4dd71b5e3  corporate/3.0/x86_64/ImageMagick-5.5.7.15-6.8.C30mdk.x86_64.rpm
 77d7216b6c3c92802470c929bf3fadc1  corporate/3.0/x86_64/ImageMagick-doc-5.5.7.15-6.8.C30mdk.x86_64.rpm
 b8831dbe0e86ef1d86219c6d9e66f62e  corporate/3.0/x86_64/lib64Magick5.5.7-5.5.7.15-6.8.C30mdk.x86_64.rpm
 e86dd59f34359230ea5fc7b58cb2a59e  corporate/3.0/x86_64/lib64Magick5.5.7-devel-5.5.7.15-6.8.C30mdk.x86_64.rpm
 a6d2ee48d4c91ba79b31d26b5f1e83b4  corporate/3.0/x86_64/perl-Magick-5.5.7.15-6.8.C30mdk.x86_64.rpm 
 c7894af769352505f059b0e16b9a34cc  corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.8.C30mdk.src.rpm

 Corporate 4.0:
 44b50bffc31a13fa724e923e407e5704  corporate/4.0/i586/ImageMagick-6.2.4.3-1.3.20060mlcs4.i586.rpm
 5efe5a1942bed2207adf2d3b2c36e46b  corporate/4.0/i586/ImageMagick-doc-6.2.4.3-1.3.20060mlcs4.i586.rpm
 558d6f229a8fe1748bbded9e768810e7  corporate/4.0/i586/libMagick8.4.2-6.2.4.3-1.3.20060mlcs4.i586.rpm
 ebe94e9238780355631db170fc2aaaad  corporate/4.0/i586/libMagick8.4.2-devel-6.2.4.3-1.3.20060mlcs4.i586.rpm
 fc13aa3e6ecfc36940080b9da42950a3  corporate/4.0/i586/perl-Image-Magick-6.2.4.3-1.3.20060mlcs4.i586.rpm 
 343443bbd8220c90bb032d524f63e503  corporate/4.0/SRPMS/ImageMagick-6.2.4.3-1.3.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 670292a2b380dd9fdc7643f13a9e3599  corporate/4.0/x86_64/ImageMagick-6.2.4.3-1.3.20060mlcs4.x86_64.rpm
 decb45c0eada9bd5c51426b798ecc95e  corporate/4.0/x86_64/ImageMagick-doc-6.2.4.3-1.3.20060mlcs4.x86_64.rpm
 3ceb638aef243a6e9c3a26cc33809f0b  corporate/4.0/x86_64/lib64Magick8.4.2-6.2.4.3-1.3.20060mlcs4.x86_64.rpm
 6c4535cf487832fbed1e37ff9cd225a7  corporate/4.0/x86_64/lib64Magick8.4.2-devel-6.2.4.3-1.3.20060mlcs4.x86_64.rpm
 3987e468326d5a5d647312e8da336b09  corporate/4.0/x86_64/perl-Image-Magick-6.2.4.3-1.3.20060mlcs4.x86_64.rpm 
 343443bbd8220c90bb032d524f63e503  corporate/4.0/SRPMS/ImageMagick-6.2.4.3-1.3.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
State-of-the-art spear phishing and defenses
Linux kernel source code repositories get better security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.