blob: 94ee3b47ef0ed86e129bd093d67b2606d955d887 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200505-16">
<title>ImageMagick, GraphicsMagick: Denial of Service vulnerability</title>
ImageMagick and GraphicsMagick utilities can be abused to perform a Denial
of Service attack.
<product type="ebuild">ImageMagick</product>
<announced>May 21, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="media-gfx/imagemagick" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
<package name="media-gfx/graphicsmagick" auto="yes" arch="*">
<unaffected range="ge">1.1.6-r1</unaffected>
<vulnerable range="lt">1.1.6-r1</vulnerable>
Both ImageMagick and GraphicsMagick are collection of tools to read,
write and manipulate images in many formats.
Tavis Ormandy of the Gentoo Linux Security Audit Team discovered a
Denial of Service vulnerability in the XWD decoder of ImageMagick and
GraphicsMagick when setting a color mask to zero.
<impact type="normal">
A remote attacker could submit a specially crafted image to a user or
an automated system making use of an affected utility, resulting in a
Denial of Service by consumption of CPU time.
There is no known workaround at this time.
All ImageMagick users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-;</code>
All GraphicsMagick users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.6-r1&quot;</code>
<uri link="">CVE-2005-1739</uri>
<metadata tag="requester" timestamp="Wed, 04 May 2005 05:18:30 +0000">
<metadata tag="submitter" timestamp="Thu, 05 May 2005 19:34:27 +0000">
<metadata tag="bugReady" timestamp="Sat, 21 May 2005 14:59:55 +0000">