CVE-2005-0761
CVSS5.0
发布时间 :2005-03-23 00:00:00
修订时间 :2010-08-21 00:26:58
NMCOS    

[原文]Unknown vulnerability in ImageMagick before 6.1.8 allows remote attackers to cause a denial of service (application crash) via a crafted PSD file.


[CNNVD]Imagemagick 未明拒绝服务漏洞(CNNVD-200503-126)

        ImageMagick 6.1.8之前版本中存在未明漏洞,远程攻击者可以通过伪装的PSD文件实施拒绝服务攻击(应用程序崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:imagemagick:imagemagick:6.0.2.5ImageMagick 6.0.2.5
cpe:/a:imagemagick:imagemagick:5.4.4.5ImageMagick 5.4.4.5
cpe:/a:sgi:propack:3.0SGI ProPack 3.0
cpe:/a:imagemagick:imagemagick:6.0.5ImageMagick 6.0.5
cpe:/a:imagemagick:imagemagick:6.0.1ImageMagick 6.0.1
cpe:/a:imagemagick:imagemagick:5.3.3ImageMagick 5.3.3
cpe:/a:imagemagick:imagemagick:6.0ImageMagick 6.0
cpe:/a:imagemagick:imagemagick:5.5.7ImageMagick 5.5.7
cpe:/a:imagemagick:imagemagick:5.5.6.0_2003-04-09ImageMagick 5.5.6.0 2003-04-09
cpe:/a:imagemagick:imagemagick:6.1.7ImageMagick 6.1.7
cpe:/a:imagemagick:imagemagick:6.0.4ImageMagick 6.0.4
cpe:/a:imagemagick:imagemagick:5.3.8ImageMagick 5.3.8
cpe:/a:imagemagick:imagemagick:6.0.2ImageMagick 6.0.2
cpe:/a:imagemagick:imagemagick:6.1.6ImageMagick 6.1.6
cpe:/a:imagemagick:imagemagick:6.0.8ImageMagick 6.0.8
cpe:/a:imagemagick:imagemagick:6.1.3ImageMagick 6.1.3
cpe:/a:imagemagick:imagemagick:6.0.6ImageMagick 6.0.6
cpe:/a:imagemagick:imagemagick:6.1ImageMagick 6.1
cpe:/a:imagemagick:imagemagick:6.1.2ImageMagick 6.1.2
cpe:/a:imagemagick:imagemagick:6.1.1.6ImageMagick 6.1.1.6
cpe:/a:imagemagick:imagemagick:5.4.8ImageMagick 5.4.8
cpe:/a:imagemagick:imagemagick:6.0.3ImageMagick 6.0.3
cpe:/a:imagemagick:imagemagick:6.0.7ImageMagick 6.0.7
cpe:/a:imagemagick:imagemagick:5.5.6ImageMagick 5.5.6
cpe:/a:imagemagick:imagemagick:6.1.4ImageMagick 6.1.4
cpe:/a:imagemagick:imagemagick:5.4.7ImageMagick 5.4.7
cpe:/a:imagemagick:imagemagick:5.5.3.2.1.2.0ImageMagick 5.5.3.2.1.2.0
cpe:/a:imagemagick:imagemagick:5.5.4ImageMagick 5.5.4
cpe:/a:imagemagick:imagemagick:5.4.3ImageMagick 5.4.3
cpe:/a:imagemagick:imagemagick:6.1.5ImageMagick 6.1.5
cpe:/a:imagemagick:imagemagick:5.4.8.2.1.1.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11150Unknown vulnerability in ImageMagick before 6.1.8 allows remote attackers to cause a denial of service (application crash) via a crafted PSD...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0761
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0761
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200503-126
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/12876
(VENDOR_ADVISORY)  BID  12876
http://www.novell.com/linux/security/advisories/2005_17_imagemagick.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2005:017
http://securitytracker.com/id?1013550
(VENDOR_ADVISORY)  SECTRACK  1013550
http://rhn.redhat.com/errata/RHSA-2005-070.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2005:070

- 漏洞信息

Imagemagick 未明拒绝服务漏洞
中危 其他
2005-03-23 00:00:00 2005-10-20 00:00:00
远程  
        ImageMagick 6.1.8之前版本中存在未明漏洞,远程攻击者可以通过伪装的PSD文件实施拒绝服务攻击(应用程序崩溃)。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        RedHat Fedora Core2
        Fedora ImageMagick-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-6.2 .0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-c++-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-c++ -6.2.0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-c++-devel-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-c++ -devel-6.2.0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-devel-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-dev el-6.2.0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-perl-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-per l-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core1
        Fedora ImageMagick-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-5.5 .6-13.legacy.i386.rpm
        Fedora ImageMagick-c++-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-c++ -5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-c++-devel-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-c++ -devel-5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-devel-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-dev el-5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-perl-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-per l-5.5.6-13.legacy.i386.rpm
        ImageMagick ImageMagick 5.3.3
        TurboLinux ImageMagick-5.3.3-5.i586.rpm
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/upd ates/RPMS/ImageMagick-5.3.3-5.i586.rpm
        TurboLinux ImageMagick-5.3.3-5.i586.rpm
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/ 7/updates/RPMS/ImageMagick-5.3.3-5.i586.rpm
        TurboLinux ImageMagick-devel-5.3.3-5.i586.rpm
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/upd ates/RPMS/ImageMagick-devel-5.3.3-5.i586.rpm
        TurboLinux ImageMagick-devel-5.3.3-5.i586.rpm
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/ 7/updates/RPMS/ImageMagick-devel-5.3.3-5.i586.rpm
        ImageMagick ImageMagick 5.4.3
        TurboLinux ImageMagick-5.4.3-4.i586.rpm
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/ 8/updates/RPMS/ImageMagick-5.4.3-4.i586.rpm
        TurboLinux ImageMagick-devel-5.4.3-4.i586.rpm
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/ 8/updates/RPMS/ImageMagick-devel-5.4.3-4.i586.rpm

- 漏洞信息

15113
ImageMagick PSD File DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-03-17 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Imagemagick Photoshop Document Parsing Unspecified Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 12876
Yes No
2005-03-23 12:00:00 2013-03-05 05:04:00
Andrei Nigmatulin is credited with the discovery of this issue.

- 受影响的程序版本

Xerox FreeFlow Print Server (FFPS) 73.C0.41
Xerox FreeFlow Print Server (FFPS) 73.B3.61
SGI ProPack 3.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
Red Hat Fedora Core2
Red Hat Fedora Core1
ImageMagick ImageMagick 6.1.7
ImageMagick ImageMagick 6.1.6
ImageMagick ImageMagick 6.1.5
ImageMagick ImageMagick 6.1.4
ImageMagick ImageMagick 6.1.3
ImageMagick ImageMagick 6.1.2
ImageMagick ImageMagick 6.1.1
ImageMagick ImageMagick 6.1
ImageMagick ImageMagick 6.0.8
ImageMagick ImageMagick 6.0.7
+ Red Hat Enterprise Linux AS 4
+ RedHat Desktop 4.0
+ RedHat Enterprise Linux Desktop version 4
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux WS 4
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
ImageMagick ImageMagick 6.0.6
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
ImageMagick ImageMagick 6.0.5
+ Turbolinux Home
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Server 10.0
ImageMagick ImageMagick 6.0.4
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
ImageMagick ImageMagick 6.0.3
ImageMagick ImageMagick 6.0.2 .5
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
ImageMagick ImageMagick 6.0.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
ImageMagick ImageMagick 6.0.1
ImageMagick ImageMagick 6.0
ImageMagick ImageMagick 5.5.7
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
ImageMagick ImageMagick 5.5.6 .0-20030409
+ OpenPKG OpenPKG Current
ImageMagick ImageMagick 5.5.6
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
ImageMagick ImageMagick 5.5.4
+ S.u.S.E. Linux Personal 8.2
ImageMagick ImageMagick 5.5.3 .2-1.2.0
+ OpenPKG OpenPKG 1.2
ImageMagick ImageMagick 5.4.8 .2-1.1.0
+ OpenPKG OpenPKG 1.1
ImageMagick ImageMagick 5.4.8
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
ImageMagick ImageMagick 5.4.7
+ Turbolinux Turbolinux Server 8.0
ImageMagick ImageMagick 5.4.4 .5
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
ImageMagick ImageMagick 5.4.3
+ Turbolinux Turbolinux Workstation 8.0
ImageMagick ImageMagick 5.3.8
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
ImageMagick ImageMagick 5.3.3
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 7.0
ImageMagick ImageMagick 6.1.8
+ Gentoo Linux

- 不受影响的程序版本

ImageMagick ImageMagick 6.1.8
+ Gentoo Linux

- 漏洞讨论

A remote, client-side denial of service vulnerability affects ImageMagick. This issue is likely due to a failure of the application to handle malformed PSD files.



A remote attacker may leverage this issue to cause the affected application to crash, potentially causing a loss of data denying service to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

This issue was reportedly addressed in ImageMagick 6.1.8. This has not been confirmed by Symantec.

TurboLinux has released advisory TLSA-2005-47 along with fixes dealing with this issue. Please see the referenced advisory for more information.

SGI has released an advisory 20050304-01-U including updated SGI ProPack 3 Service Pack 4 packages to address this issue. Please see the referenced advisory for more information.

SuSE Linux has released advisory SUSE-SA:2005:017 along with fixes dealing with this issue. Please see the referenced advisory for more information.

Red Hat has released advisory RHSA-2005:070-16 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.

RedHat Fedora Legacy has released security advisory FLSA:152777 addressing this issue for RedHat Linux 7.3 and 9.0, and for Fedora Core 1 and 2. Please see the referenced advisory for further information.


Red Hat Fedora Core2

Red Hat Fedora Core1

ImageMagick ImageMagick 5.3.3

ImageMagick ImageMagick 5.4.3

ImageMagick ImageMagick 5.4.7

ImageMagick ImageMagick 5.5.4

ImageMagick ImageMagick 5.5.7

ImageMagick ImageMagick 6.0.5

ImageMagick ImageMagick 6.0.7

RedHat Linux 7.3 i386

RedHat Linux 7.3 i686

RedHat Linux 7.3

RedHat Linux 9.0 i386

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站