![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50582 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDKSA-2004:102 (ImageMagick) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to ImageMagick announced via advisory MDKSA-2004:102. Several buffer overflow vulnerabilities in ImageMagick were discovered by Marcus Meissner from SUSE. These vulnerabilities would allow an attacker to create a malicious image or video file in AVI, BMP, or DIB formats which could crash the reading process. It may be possible to create malicious images that could also allow for the execution of arbitray code with the privileges of the invoking user or process. The updated packages provided are patched to correct these problems. Affected versions: 10.0, 9.2, Corporate Server 2.1 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0827 Risk factor : Medium CVSS Score: 5.0 |
Cross-Ref: |
BugTraq ID: 8653 Common Vulnerability Exposure (CVE) ID: CVE-2003-0827 AIX APAR: IY47686 http://www-1.ibm.com/support/search.wss?rs=0&q=IY47686&apar=only Bugtraq: 20030919 AppSecInc Security Alert: Denial of Service Vulnerability in DB2 Discovery Service (Google Search) http://marc.info/?l=bugtraq&m=106399616919636&w=2 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |