Out-of-Bounds Affecting imagemagick package, versions <7:6.2.4.5.dfsg1-0.11
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-IMAGEMAGICK-523716
- published 23 Oct 2006
- disclosed 23 Oct 2006
Introduced: 23 Oct 2006
CVE-2006-5456 Open this link in a new tabHow to fix?
Upgrade Debian:11
imagemagick
to version 7:6.2.4.5.dfsg1-0.11 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream imagemagick
package and not the imagemagick
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
References
- https://security-tracker.debian.org/tracker/CVE-2006-5456
- http://www.securityfocus.com/archive/1/452718/100/100/threaded
- http://www.securityfocus.com/archive/1/459507/100/0/threaded
- http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
- https://issues.rpath.com/browse/RPL-1034
- https://issues.rpath.com/browse/RPL-811
- http://www.debian.org/security/2006/dsa-1213
- http://security.gentoo.org/glsa/glsa-200611-07.xml
- http://security.gentoo.org/glsa/glsa-200611-19.xml
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921
- http://secunia.com/advisories/22569
- http://secunia.com/advisories/22572
- http://secunia.com/advisories/22601
- http://secunia.com/advisories/22604
- http://secunia.com/advisories/22819
- http://secunia.com/advisories/22834
- http://secunia.com/advisories/22998
- http://secunia.com/advisories/23090
- http://secunia.com/advisories/23121
- http://secunia.com/advisories/24186
- http://secunia.com/advisories/24196
- http://secunia.com/advisories/24284
- http://secunia.com/advisories/24458
- http://www.securityfocus.com/bid/20707
- ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092
- http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html
- http://www.novell.com/linux/security/advisories/2007_3_sr.html
- http://www.ubuntu.com/usn/usn-372-1
- http://www.ubuntu.com/usn/usn-422-1
- http://www.vupen.com/english/advisories/2006/4170
- http://www.vupen.com/english/advisories/2006/4171
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29816
- http://www.redhat.com/support/errata/RHSA-2007-0015.html
- http://www.osvdb.org/29990
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:193
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:041