LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 1st, 2014
Linux Security Week: July 28th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2012:160: imagemagick Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A vulnerability has been found and corrected in imagemagick: The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2012:160
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : imagemagick
 Date    : October 5, 2012
 Affected: 2011., Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been found and corrected in imagemagick:
 
 The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8-6
 does not use the proper variable type for the allocation size, which
 might allow remote attackers to cause a denial of service (crash)
 via a crafted PNG file that triggers incorrect memory allocation
 (CVE-2012-3437).
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2011:
 e3c76bded9a774eea31a8e6fe670f9b6  2011/i586/imagemagick-6.7.0.9-1.2-mdv2011.0.i586.rpm
 e0850b9c33271801e880cc8f34aba0d6  2011/i586/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.i586.rpm
 9d763cf168f088cd295b8dfec0e6c850  2011/i586/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.i586.rpm
 89354e093083f69a2ece10439eb9a89c  2011/i586/libmagick4-6.7.0.9-1.2-mdv2011.0.i586.rpm
 026e039ee1b2428e3987744d8c0fe132  2011/i586/libmagick-devel-6.7.0.9-1.2-mdv2011.0.i586.rpm
 ba14a74f5902c7369280ff15d005c42d  2011/i586/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.i586.rpm 
 5456e1d122ec21656f07053d35aaee97  2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm

 Mandriva Linux 2011/X86_64:
 f926991c5980ac2c39ebe4527868c1af  2011/x86_64/imagemagick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 1e0deadb027234db5e6a1471771daa2e  2011/x86_64/imagemagick-desktop-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 ee861a0cf7dba66e042d9b8f0fd70eda  2011/x86_64/imagemagick-doc-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 b2a886844058051f141fe15a6e53ff16  2011/x86_64/lib64magick4-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 1f8e6c539b1877742f8e64bfdcecbc4d  2011/x86_64/lib64magick-devel-6.7.0.9-1.2-mdv2011.0.x86_64.rpm
 2656e1a7b20dd77dd1deea52863e60f0  2011/x86_64/perl-Image-Magick-6.7.0.9-1.2-mdv2011.0.x86_64.rpm 
 5456e1d122ec21656f07053d35aaee97  2011/SRPMS/imagemagick-6.7.0.9-1.2.src.rpm

 Mandriva Enterprise Server 5:
 f3aba495ee3a944e4e9ccafdfffac131  mes5/i586/imagemagick-6.4.2.10-5.4mdvmes5.2.i586.rpm
 ba1858f1faf3c7e159ec8eebf558411a  mes5/i586/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.i586.rpm
 74a73593b07d82332f9ed7a77a3317f7  mes5/i586/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.i586.rpm
 4d5d5b4b7de7dcb477e317ee9604c0c1  mes5/i586/libmagick1-6.4.2.10-5.4mdvmes5.2.i586.rpm
 cae27a3fa3c1abfcac6495152622149d  mes5/i586/libmagick-devel-6.4.2.10-5.4mdvmes5.2.i586.rpm
 9d892e3973d374a879ad033ac5a2fada  mes5/i586/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.i586.rpm 
 98692ccd382085f7419e70475051173b  mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 cd0ff0a94a6e5aae6e205f7a28c68da3  mes5/x86_64/imagemagick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 39046fb7ab97f63c6df0973a40fae4ce  mes5/x86_64/imagemagick-desktop-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 c63eca56b0a188f49f0584899e512049  mes5/x86_64/imagemagick-doc-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 03608e7eb8ba79563d091178b5de3b60  mes5/x86_64/lib64magick1-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 363f3f3375150377ada47a9f6be761b4  mes5/x86_64/lib64magick-devel-6.4.2.10-5.4mdvmes5.2.x86_64.rpm
 17bd98545b888e9d0a1c8e31058fea34  mes5/x86_64/perl-Image-Magick-6.4.2.10-5.4mdvmes5.2.x86_64.rpm 
 98692ccd382085f7419e70475051173b  mes5/SRPMS/imagemagick-6.4.2.10-5.4mdvmes5.2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Attackers can easily create dangerous file-encrypting malware, new threat suggests
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.