blob: f8215de1b0baa0cdab58980d996424c6e1f307f6 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201203-09">
<title>ImageMagick: User-assisted execution of arbitrary code</title>
<synopsis>Vulnerabilities found in ImageMagick might allow remote attackers
to execute arbitrary code.
<product type="ebuild">ImageMagick</product>
<announced>March 06, 2012</announced>
<revised>March 06, 2012: 1</revised>
<package name="media-gfx/imagemagick" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
<p>ImageMagick is a collection of tools and libraries for manipulating
various image formats.
<p>Two vulnerabilities have been found in ImageMagick:</p>
<li>Incorrect offset and count values in the ResolutionUnit tag in EXIF
IFD could cause memory corruption (CVE-2012-0247).
<li>IOP tag offsets pointing to the beginning of an IFD could cause an
infinite loop of ImageMagick parsing the IFD structure (CVE-2012-0248).
<impact type="normal">
<p>A remote attacker could entice a user to open a specially crafted image,
possibly resulting in execution of arbitrary code or a Denial of Service
<p>There is no known workaround at this time.</p>
<p>All ImageMagick users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-"
<uri link="">CVE-2012-0247</uri>
<uri link="">CVE-2012-0248</uri>
<metadata timestamp="Sat, 03 Mar 2012 14:41:18 +0000" tag="requester">ackle</metadata>
<metadata timestamp="Tue, 06 Mar 2012 01:41:55 +0000" tag="submitter">ackle</metadata>