Rapid7 Vulnerability & Exploit Database

CESA-2005:413: ImageMagick security update

Back to Search

CESA-2005:413: ImageMagick security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
04/25/2005
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated ImageMagick packages that fix a buffer overflow issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

ImageMagick(TM) is an image display and manipulation tool for the X Window System which can read and write multiple image formats. A heap based buffer overflow bug was found in the way ImageMagick parses PNM files. An attacker could execute arbitrary code on a victim's machine if they were able to trick the victim into opening a specially crafted PNM file. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-1275 to this issue. Users of ImageMagick should upgrade to these updated packages, which contain a backported patch, and are not vulnerable to this issue.

Solution(s)

  • centos-upgrade-imagemagick
  • centos-upgrade-imagemagick-c
  • centos-upgrade-imagemagick-c-devel
  • centos-upgrade-imagemagick-devel
  • centos-upgrade-imagemagick-perl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;