Use of Externally-Controlled Format String Affecting imagemagick package, versions <6:6.2.4.5-0.6


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
2.1% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of Externally-Controlled Format String vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-IMAGEMAGICK-403126
  • published4 Jan 2006
  • disclosed4 Jan 2006

Introduced: 4 Jan 2006

CVE-2006-0082  (opens in a new tab)
CWE-134  (opens in a new tab)

How to fix?

Upgrade Debian:unstable imagemagick to version 6:6.2.4.5-0.6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream imagemagick package and not the imagemagick package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier such as %d in the file name, a variant of CVE-2005-0397, and as demonstrated using the convert program.

CVSS Scores

version 3.1