English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56231
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-246-1 (imagemagick)
Summary:Ubuntu USN-246-1 (imagemagick)
Description:
The remote host is missing an update to imagemagick
announced via advisory USN-246-1.


A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected: imagemagick

Florian Weimer discovered that the delegate code did not correctly
handle file names which embed shell commands (CVE-2005-4601). Daniel
Kobras found a format string vulnerability in the SetImageInfo()
function (CVE-2006-0082). By tricking a user into processing an image
file with a specially crafted file name, these two vulnerabilities
could be exploited to execute arbitrary commands with the user's
privileges. These vulnerability become particularly critical if
malicious images are sent as email attachments and the email client
uses imagemagick to convert/display the images (e. g. Thunderbird and
Gnus).

In addition, Eero Hakkinen reported a bug in the command line argument
processing of the 'display' command. Arguments that contained
wildcards and were expanded to several files could trigger a heap
overflow. However, there is no known possiblity to exploit this
remotely. (http://bugs.debian.org/345595)

Solution:
The problem can be corrected by upgrading the affected package to
version 5:6.0.2.5-1ubuntu1.6 (for Ubuntu 4.10), 6:6.0.6.2-2.1ubuntu1.2
(for Ubuntu 5.04), or 6:6.2.3.4-1ubuntu1.1 (for Ubuntu 5.10). In
general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-246-1
http://bugs.debian.org/345595

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-4601
Bugtraq: 20061127 rPSA-2006-0218-1 ImageMagick (Google Search)
http://www.securityfocus.com/archive/1/archive/1/452718/100/100/threaded
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345238
Debian Security Information: DSA-957 (Google Search)
http://www.debian.org/security/2006/dsa-957
http://www.mandriva.com/security/advisories?name=MDKSA-2006:024
RedHat Security Advisories: RHSA-2006:0178
http://rhn.redhat.com/errata/RHSA-2006-0178.html
SGI Security Advisory: 20060301-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.341682
http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
SuSE Security Announcement: SUSE-SR:2006:006 (Google Search)
http://www.novell.com/linux/security/advisories/2006_06_sr.html
http://www.ubuntu.com/usn/usn-246-1
BugTraq ID: 16093
http://www.securityfocus.com/bid/16093
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10353
http://www.vupen.com/english/advisories/2008/0412
http://www.osvdb.org/22121
http://secunia.com/advisories/18261
http://secunia.com/advisories/18607
http://secunia.com/advisories/18631
http://secunia.com/advisories/18871
http://secunia.com/advisories/19183
http://secunia.com/advisories/19408
http://secunia.com/advisories/23090
http://secunia.com/advisories/28800
XForce ISS Database: imagemagick-filename-command-injection(23927)
http://xforce.iss.net/xforce/xfdb/23927
Common Vulnerability Exposure (CVE) ID: CVE-2006-0082
Debian Security Information: DSA-1213 (Google Search)
http://www.debian.org/security/2006/dsa-1213
http://www.gentoo.org/security/en/glsa/glsa-200602-06.xml
http://www.gentoo.org/security/en/glsa/glsa-200602-13.xml
BugTraq ID: 12717
http://www.securityfocus.com/bid/12717
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10717
http://securitytracker.com/id?1015623
http://secunia.com/advisories/18851
http://secunia.com/advisories/19030
http://secunia.com/advisories/22998
http://securityreason.com/securityalert/500
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.