Improper Input Validation Affecting imagemagick package, versions <8:6.6.9.7-6
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
82.04% (99th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-IMAGEMAGICK-518942
- published 5 Jun 2012
- disclosed 5 Jun 2012
How to fix?
Upgrade Debian:11
imagemagick
to version 8:6.6.9.7-6 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream imagemagick
package and not the imagemagick
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
References
- https://security-tracker.debian.org/tracker/CVE-2012-0247
- http://www.debian.org/security/2012/dsa-2427
- http://www.gentoo.org/security/en/glsa/glsa-201203-09.xml
- http://ubuntu.com/usn/usn-1435-1
- http://www.cert.fi/en/reports/2012/vulnerability595210.html
- http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20286
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://rhn.redhat.com/errata/RHSA-2012-0545.html
- http://secunia.com/advisories/47926
- http://secunia.com/advisories/48247
- http://secunia.com/advisories/48259
- http://secunia.com/advisories/49043
- http://secunia.com/advisories/49063
- http://secunia.com/advisories/49068
- http://www.securitytracker.com/id?1027032
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-0247
- http://www.osvdb.org/79003