Document ImageMagick - Multiple vulnerabilities
Submitted by: Nick Barkas
This commit is contained in:
parent
4f1e928298
commit
279fd2f245
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=201258
@ -34,6 +34,61 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="f5b29ec0-71f9-11dc-8c6a-00304881ac9a">
|
||||
<topic>ImageMagick -- multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>ImageMagick</name>
|
||||
<name>ImageMagick-nox11</name>
|
||||
<range><lt>6.3.5.9</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Multiple vulnerabilities have been discovered in ImageMagick.</p>
|
||||
<blockquote cite="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4985">
|
||||
<p>ImageMagick before 6.3.5-9 allows context-dependent attackers
|
||||
to cause a denial of service via a crafted image file that
|
||||
triggers (1) an infinite loop in the ReadDCMImage function,
|
||||
related to ReadBlobByte function calls; or (2) an infinite
|
||||
loop in the ReadXCFImage function, related to ReadBlobMSBLong
|
||||
function calls.</p>
|
||||
</blockquote>
|
||||
<blockquote cite="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4986">
|
||||
<p>Multiple integer overflows in ImageMagick before 6.3.5-9
|
||||
allow context-dependent attackers to execute arbitrary code
|
||||
via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5)
|
||||
.xwd image file, which triggers a heap-based buffer overflow.</p>
|
||||
</blockquote>
|
||||
<blockquote cite="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4987">
|
||||
<p>Off-by-one error in the ReadBlobString function in blob.c in
|
||||
ImageMagick before 6.3.5-9 allows context-dependent attackers
|
||||
to execute arbitrary code via a crafted image file, which
|
||||
triggers the writing of a '\0' character to an out-of-bounds
|
||||
address.</p>
|
||||
</blockquote>
|
||||
<blockquote cite="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4988">
|
||||
<p>Sign extension error in the ReadDIBImage function in
|
||||
ImageMagick before 6.3.5-9 allows context-dependent attackers
|
||||
to execute arbitrary code via a crafted width value in an
|
||||
image file, which triggers an integer overflow and a
|
||||
heap-based buffer overflow.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2007-4985</cvename>
|
||||
<cvename>CVE-2007-4986</cvename>
|
||||
<cvename>CVE-2007-4987</cvename>
|
||||
<cvename>CVE-2007-4988</cvename>
|
||||
<url>http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2007-09-19</discovery>
|
||||
<entry>2007-10-10</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="c93e4d41-75c5-11dc-b903-0016179b2dd5">
|
||||
<topic>jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user