Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in imagemagick
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in imagemagick
ID: RHSA-2005:071-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Mi, 16. Februar 2005, 12:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0005
Applikationen: ImageMagick

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Moderate: ImageMagick security update
Advisory ID: RHSA-2005:071-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-071.html
Issue date: 2005-02-15
Updated on: 2005-02-15
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0005
---------------------------------------------------------------------

1. Summary:

Updated ImageMagick packages that fix a security flaw are now available for
Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

ImageMagick is an image display and manipulation tool for the X Window
System.

Andrei Nigmatulin discovered a heap based buffer overflow flaw in the
ImageMagick image handler. An attacker could create a carefully crafted
Photoshop Document (PSD) image in such a way that it would cause
ImageMagick to execute arbitrary code when processing the image. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0005 to this issue.

Users of ImageMagick should upgrade to these updated packages, which
contain a backported patch, and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

145123 - CAN-2005-0005 buffer overflow in ImageMagick

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ImageMagick-6.0.7.1-6.src.rpm
a5c8511327dc216e6543f2bcce9dbaef ImageMagick-6.0.7.1-6.src.rpm

i386:
1145a7d29a8b8f444d94834b5e6c32af ImageMagick-6.0.7.1-6.i386.rpm
7f77e9423e940706e843737c6caaf53f ImageMagick-c++-6.0.7.1-6.i386.rpm
e1b8cf2f535ba390f07619327540cb84 ImageMagick-c++-devel-6.0.7.1-6.i386.rpm
7748f74dadba601fb43eb04b6bd5787a ImageMagick-devel-6.0.7.1-6.i386.rpm
e907c9aaab08c87c815d289ae3e34d24 ImageMagick-perl-6.0.7.1-6.i386.rpm

ia64:
6389e67ad2ec903f8744355a026671c0 ImageMagick-6.0.7.1-6.ia64.rpm
0a5415a7dd437424be36edda7e59404f ImageMagick-c++-6.0.7.1-6.ia64.rpm
7ccc183bce8e328c017a6acd15f85746 ImageMagick-c++-devel-6.0.7.1-6.ia64.rpm
0fbfca7d0531822f1b64fe28410b089a ImageMagick-devel-6.0.7.1-6.ia64.rpm
975b389ef4c61819221a33b46d5798c5 ImageMagick-perl-6.0.7.1-6.ia64.rpm

ppc:
0005695a74c40faa555381d9294bbce8 ImageMagick-6.0.7.1-6.ppc.rpm
7e07a4f6de79a6185867b12b13263200 ImageMagick-c++-6.0.7.1-6.ppc.rpm
ab2dac355d35242988da6873de6422e2 ImageMagick-c++-devel-6.0.7.1-6.ppc.rpm
62a235627ca1eee014b69ee68ee6b93f ImageMagick-devel-6.0.7.1-6.ppc.rpm
76d2a6e6ab17003535fa8019d3fbeab9 ImageMagick-perl-6.0.7.1-6.ppc.rpm

s390:
6d43807788a76a876b4abef3ff0ff1b0 ImageMagick-6.0.7.1-6.s390.rpm
321e1f007114e0bd581bd83b0eda7fe6 ImageMagick-c++-6.0.7.1-6.s390.rpm
3b0d090b96e796c6aff5507d13ed35ae ImageMagick-c++-devel-6.0.7.1-6.s390.rpm
764d139053a2964c1ecee0407ea60c41 ImageMagick-devel-6.0.7.1-6.s390.rpm
c239527e5377076c6d57afea04fa18c3 ImageMagick-perl-6.0.7.1-6.s390.rpm

s390x:
83717e077a6401a30f9d52b858d62809 ImageMagick-6.0.7.1-6.s390x.rpm
c4898fe5d9b06b537f7871c812846d22 ImageMagick-c++-6.0.7.1-6.s390x.rpm
5aaf3be1910b8ce7b4e7ed01fb35e049 ImageMagick-c++-devel-6.0.7.1-6.s390x.rpm
7672587e292ef5e94490749e367508a8 ImageMagick-devel-6.0.7.1-6.s390x.rpm
7bc82308c1b8b405ba45ced6553a1fe0 ImageMagick-perl-6.0.7.1-6.s390x.rpm

x86_64:
2f0ee7ea6c2facad27ef786ded68e8c1 ImageMagick-6.0.7.1-6.x86_64.rpm
f0950411b38e248645c771ea85b9125d ImageMagick-c++-6.0.7.1-6.x86_64.rpm
4fdf0a7ccc22f73ddb510ac627bc63d5 ImageMagick-c++-devel-6.0.7.1-6.x86_64.rpm
0f8e9d58c905273acc2a5a0410bbd801 ImageMagick-devel-6.0.7.1-6.x86_64.rpm
616716d249de35ad9e3888a251757675 ImageMagick-perl-6.0.7.1-6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ImageMagick-6.0.7.1-6.src.rpm
a5c8511327dc216e6543f2bcce9dbaef ImageMagick-6.0.7.1-6.src.rpm

i386:
1145a7d29a8b8f444d94834b5e6c32af ImageMagick-6.0.7.1-6.i386.rpm
7f77e9423e940706e843737c6caaf53f ImageMagick-c++-6.0.7.1-6.i386.rpm
e1b8cf2f535ba390f07619327540cb84 ImageMagick-c++-devel-6.0.7.1-6.i386.rpm
7748f74dadba601fb43eb04b6bd5787a ImageMagick-devel-6.0.7.1-6.i386.rpm
e907c9aaab08c87c815d289ae3e34d24 ImageMagick-perl-6.0.7.1-6.i386.rpm

x86_64:
2f0ee7ea6c2facad27ef786ded68e8c1 ImageMagick-6.0.7.1-6.x86_64.rpm
f0950411b38e248645c771ea85b9125d ImageMagick-c++-6.0.7.1-6.x86_64.rpm
4fdf0a7ccc22f73ddb510ac627bc63d5 ImageMagick-c++-devel-6.0.7.1-6.x86_64.rpm
0f8e9d58c905273acc2a5a0410bbd801 ImageMagick-devel-6.0.7.1-6.x86_64.rpm
616716d249de35ad9e3888a251757675 ImageMagick-perl-6.0.7.1-6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ImageMagick-6.0.7.1-6.src.rpm
a5c8511327dc216e6543f2bcce9dbaef ImageMagick-6.0.7.1-6.src.rpm

i386:
1145a7d29a8b8f444d94834b5e6c32af ImageMagick-6.0.7.1-6.i386.rpm
7f77e9423e940706e843737c6caaf53f ImageMagick-c++-6.0.7.1-6.i386.rpm
e1b8cf2f535ba390f07619327540cb84 ImageMagick-c++-devel-6.0.7.1-6.i386.rpm
7748f74dadba601fb43eb04b6bd5787a ImageMagick-devel-6.0.7.1-6.i386.rpm
e907c9aaab08c87c815d289ae3e34d24 ImageMagick-perl-6.0.7.1-6.i386.rpm

ia64:
6389e67ad2ec903f8744355a026671c0 ImageMagick-6.0.7.1-6.ia64.rpm
0a5415a7dd437424be36edda7e59404f ImageMagick-c++-6.0.7.1-6.ia64.rpm
7ccc183bce8e328c017a6acd15f85746 ImageMagick-c++-devel-6.0.7.1-6.ia64.rpm
0fbfca7d0531822f1b64fe28410b089a ImageMagick-devel-6.0.7.1-6.ia64.rpm
975b389ef4c61819221a33b46d5798c5 ImageMagick-perl-6.0.7.1-6.ia64.rpm

x86_64:
2f0ee7ea6c2facad27ef786ded68e8c1 ImageMagick-6.0.7.1-6.x86_64.rpm
f0950411b38e248645c771ea85b9125d ImageMagick-c++-6.0.7.1-6.x86_64.rpm
4fdf0a7ccc22f73ddb510ac627bc63d5 ImageMagick-c++-devel-6.0.7.1-6.x86_64.rpm
0f8e9d58c905273acc2a5a0410bbd801 ImageMagick-devel-6.0.7.1-6.x86_64.rpm
616716d249de35ad9e3888a251757675 ImageMagick-perl-6.0.7.1-6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ImageMagick-6.0.7.1-6.src.rpm
a5c8511327dc216e6543f2bcce9dbaef ImageMagick-6.0.7.1-6.src.rpm

i386:
1145a7d29a8b8f444d94834b5e6c32af ImageMagick-6.0.7.1-6.i386.rpm
7f77e9423e940706e843737c6caaf53f ImageMagick-c++-6.0.7.1-6.i386.rpm
e1b8cf2f535ba390f07619327540cb84 ImageMagick-c++-devel-6.0.7.1-6.i386.rpm
7748f74dadba601fb43eb04b6bd5787a ImageMagick-devel-6.0.7.1-6.i386.rpm
e907c9aaab08c87c815d289ae3e34d24 ImageMagick-perl-6.0.7.1-6.i386.rpm

ia64:
6389e67ad2ec903f8744355a026671c0 ImageMagick-6.0.7.1-6.ia64.rpm
0a5415a7dd437424be36edda7e59404f ImageMagick-c++-6.0.7.1-6.ia64.rpm
7ccc183bce8e328c017a6acd15f85746 ImageMagick-c++-devel-6.0.7.1-6.ia64.rpm
0fbfca7d0531822f1b64fe28410b089a ImageMagick-devel-6.0.7.1-6.ia64.rpm
975b389ef4c61819221a33b46d5798c5 ImageMagick-perl-6.0.7.1-6.ia64.rpm

x86_64:
2f0ee7ea6c2facad27ef786ded68e8c1 ImageMagick-6.0.7.1-6.x86_64.rpm
f0950411b38e248645c771ea85b9125d ImageMagick-c++-6.0.7.1-6.x86_64.rpm
4fdf0a7ccc22f73ddb510ac627bc63d5 ImageMagick-c++-devel-6.0.7.1-6.x86_64.rpm
0f8e9d58c905273acc2a5a0410bbd801 ImageMagick-devel-6.0.7.1-6.x86_64.rpm
616716d249de35ad9e3888a251757675 ImageMagick-perl-6.0.7.1-6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCEcyEXlSAg2UNWIIRAskuAKC10/Xi5883UVe4hB+cMDDUo2ksOQCdEvka
+u9EVyCFUobEDbMm0nQR+2o=
=ixMf
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung