Resource Management Errors Affecting imagemagick package, versions <7:6.2.4.5.dfsg1-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-IMAGEMAGICK-524195
- published 5 Mar 2008
- disclosed 5 Mar 2008
Introduced: 5 Mar 2008
CVE-2008-1097 Open this link in a new tabHow to fix?
Upgrade Debian:11
imagemagick
to version 7:6.2.4.5.dfsg1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream imagemagick
package and not the imagemagick
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.
References
- https://security-tracker.debian.org/tracker/CVE-2008-1097
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413034
- http://www.debian.org/security/2009/dsa-1858
- http://security.gentoo.org/glsa/glsa-201311-10.xml
- http://osvdb.org/43213
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11237
- https://bugzilla.redhat.com/show_bug.cgi?id=285861
- http://secunia.com/advisories/29786
- http://secunia.com/advisories/29857
- http://secunia.com/advisories/30967
- http://secunia.com/advisories/36260
- http://secunia.com/advisories/55721
- http://www.securityfocus.com/bid/28822
- http://www.securitytracker.com/id?1019881
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41193
- http://www.redhat.com/support/errata/RHSA-2008-0145.html
- http://www.redhat.com/support/errata/RHSA-2008-0165.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:099