blob: 27c0df1f272ad4ffc194ca20f383f8f8b42a48fc [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200503-11">
<title>ImageMagick: Filename handling vulnerability</title>
A format string vulnerability exists in ImageMagick that may allow an
attacker to execute arbitrary code.
<product type="ebuild">ImageMagick</product>
<announced>March 06, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="media-gfx/imagemagick" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
ImageMagick is a collection of tools and libraries for manipulating a
wide variety of image formats.
Tavis Ormandy of the Gentoo Linux Security Audit Team has identified a
flaw in the handling of filenames by the ImageMagick utilities.
<impact type="normal">
Successful exploitation may disrupt web applications that depend on
ImageMagick for image processing, potentially executing arbitrary code.
There is no known workaround at this time.
All ImageMagick users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-;</code>
<uri link="">CVE-2005-0397</uri>
<metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:44:33 +0000">
<metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:24:40 +0000">
<metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 13:03:12 +0000">