CVE-2005-1275
CVSS5.0
发布时间 :2005-04-25 00:00:00
修订时间 :2010-08-21 00:28:23
NMCOS    

[原文]Heap-based buffer overflow in the ReadPNMImage function in pnm.c for ImageMagick 6.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a PNM file with a small colors value.


[CNNVD]ImageMagick PNM图像解码远程缓冲区溢出漏洞(CNNVD-200504-099)

        ImageMagick是一套稳定的工具集和开发包,可以用来读、写和处理超过89种基本格式的图片文件,包括流行的TIFF, JPEG, GIF, PNG, PDF以及PhotoCD等格式。利用ImageMagick,你可以根据web应用程序的需要动态生成图片, 还可以对一个图片或图片序列进行改变大小、旋转、锐化、减色或增加特效,并将操作的结果以相同格式或其它格式保存。对图片的操作,可以通过命令行进行,也可以用C/C++、Perl、Java、PHP、Python或Ruby编程来完成。同时ImageMagick提供了一个高质量的2D工具包,部分地支持SVG。现在,ImageMagic的主要精力集中在性能、减少bug以及提供稳定的API和ABI上。
        用于ImageMagick 6.2.1及更早版本的pnm.c中的ReadPNMImage函数存在栈缓冲区溢出,远程攻击者可以通过带有小颜色值的PNM文件来发起拒绝服务攻击(应用程序崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:imagemagick:imagemagick:6.0.2.5ImageMagick 6.0.2.5
cpe:/a:imagemagick:imagemagick:6.1.8ImageMagick 6.1.8
cpe:/a:imagemagick:imagemagick:6.2.0.4ImageMagick 6.2.0.4
cpe:/a:imagemagick:imagemagick:6.0.5ImageMagick 6.0.5
cpe:/a:imagemagick:imagemagick:6.0.1ImageMagick 6.0.1
cpe:/a:imagemagick:imagemagick:6.0ImageMagick 6.0
cpe:/a:graphicsmagick:graphicsmagick:1.1.3GraphicsMagick 1.1.3
cpe:/a:graphicsmagick:graphicsmagick:1.0GraphicsMagick 1.0
cpe:/a:imagemagick:imagemagick:6.1.7ImageMagick 6.1.7
cpe:/a:imagemagick:imagemagick:6.0.4ImageMagick 6.0.4
cpe:/a:imagemagick:imagemagick:6.2.0.7ImageMagick 6.2.0.7
cpe:/a:imagemagick:imagemagick:6.0.2ImageMagick 6.0.2
cpe:/a:graphicsmagick:graphicsmagick:1.1.5GraphicsMagick 1.1.5
cpe:/a:imagemagick:imagemagick:6.1.6ImageMagick 6.1.6
cpe:/a:imagemagick:imagemagick:6.0.8ImageMagick 6.0.8
cpe:/a:graphicsmagick:graphicsmagick:1.1GraphicsMagick 1.1
cpe:/a:imagemagick:imagemagick:6.1.3ImageMagick 6.1.3
cpe:/a:imagemagick:imagemagick:6.0.6ImageMagick 6.0.6
cpe:/a:imagemagick:imagemagick:6.1ImageMagick 6.1
cpe:/a:graphicsmagick:graphicsmagick:1.1.4GraphicsMagick 1.1.4
cpe:/a:imagemagick:imagemagick:6.1.2ImageMagick 6.1.2
cpe:/a:imagemagick:imagemagick:6.1.1.6ImageMagick 6.1.1.6
cpe:/a:imagemagick:imagemagick:6.0.3ImageMagick 6.0.3
cpe:/a:imagemagick:imagemagick:6.2.1ImageMagick 6.2.1
cpe:/a:graphicsmagick:graphicsmagick:1.0.6GraphicsMagick 1.0.6
cpe:/a:imagemagick:imagemagick:6.0.7ImageMagick 6.0.7
cpe:/a:imagemagick:imagemagick:6.1.4ImageMagick 6.1.4
cpe:/a:imagemagick:imagemagick:6.2ImageMagick 6.2
cpe:/a:imagemagick:imagemagick:6.1.5ImageMagick 6.1.5

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:711ImageMagick Buffer Overflow in ReadPNMImage()
oval:org.mitre.oval:def:10003Heap-based buffer overflow in the ReadPNMImage function in pnm.c for ImageMagick 6.2.1 and earlier allows remote attackers to cause a denial...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1275
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1275
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200504-099
(官方数据源) CNNVD

- 其它链接及资源

http://www.imagemagick.org/script/changelog.php
(PATCH)  CONFIRM  http://www.imagemagick.org/script/changelog.php
http://www.securityfocus.com/bid/13351
(UNKNOWN)  BID  13351
http://www.overflow.pl/adv/imheapoverflow.txt
(UNKNOWN)  MISC  http://www.overflow.pl/adv/imheapoverflow.txt
http://seclists.org/lists/bugtraq/2005/Apr/0407.html
(UNKNOWN)  BUGTRAQ  20050424 [Overflow.pl] ImageMagick ReadPNMImage() Heap Overflow
http://bugs.gentoo.org/show_bug.cgi?id=90423
(UNKNOWN)  MISC  http://bugs.gentoo.org/show_bug.cgi?id=90423
http://www.redhat.com/support/errata/RHSA-2005-413.html
(UNKNOWN)  REDHAT  RHSA-2005:413
http://www.mandriva.com/security/advisories?name=MDKSA-2005:107
(UNKNOWN)  MANDRAKE  MDKSA-2005:107

- 漏洞信息

ImageMagick PNM图像解码远程缓冲区溢出漏洞
中危 缓冲区溢出
2005-04-25 00:00:00 2005-10-20 00:00:00
远程  
        ImageMagick是一套稳定的工具集和开发包,可以用来读、写和处理超过89种基本格式的图片文件,包括流行的TIFF, JPEG, GIF, PNG, PDF以及PhotoCD等格式。利用ImageMagick,你可以根据web应用程序的需要动态生成图片, 还可以对一个图片或图片序列进行改变大小、旋转、锐化、减色或增加特效,并将操作的结果以相同格式或其它格式保存。对图片的操作,可以通过命令行进行,也可以用C/C++、Perl、Java、PHP、Python或Ruby编程来完成。同时ImageMagick提供了一个高质量的2D工具包,部分地支持SVG。现在,ImageMagic的主要精力集中在性能、减少bug以及提供稳定的API和ABI上。
        用于ImageMagick 6.2.1及更早版本的pnm.c中的ReadPNMImage函数存在栈缓冲区溢出,远程攻击者可以通过带有小颜色值的PNM文件来发起拒绝服务攻击(应用程序崩溃)。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        ImageMagick ImageMagick 5.5.7.15
        Mandriva ImageMagick-5.5.7.15-6.4.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-5.5.7.15-6.4.C30mdk.src.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-5.5.7.15-6.4.C30mdk.src.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-5.5.7.15-6.4.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-doc-5.5.7.15-6.4.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-doc-5.5.7.15-6.4.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64Magick5.5.7-5.5.7.15-6.4.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64Magick5.5.7-devel-5.5.7.15-6.4.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        Mandriva libMagick5.5.7-5.5.7.15-6.4.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva libMagick5.5.7-devel-5.5.7.15-6.4.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva perl-Magick-5.5.7.15-6.4.C30mdk.i586.rpm
        Corporate 3.0:
        http://www.mandriva.com/en/download
        Mandriva perl-Magick-5.5.7.15-6.4.C30mdk.x86_64.rpm
        Corporate 3.0/X86_64:
        http://www.mandriva.com/en/download
        RedHat Fedora Core2
        Fedora ImageMagick-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-6.2 .0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-c++-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-c++ -6.2.0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-c++-devel-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-c++ -devel-6.2.0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-devel-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-dev el-6.2.0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-perl-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core 2
        http://download.fedoralegacy.org/fedora/2/updates/i386/ImageMagick-per l-6.2.0.7-2.fc2.4.legacy.i386.rpm
        RedHat Fedora Core1
        Fedora ImageMagick-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-5.5 .6-13.legacy.i386.rpm
        Fedora ImageMagick-c++-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-c++ -5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-c++-devel-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-c++ -devel-5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-devel-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-dev el-5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-perl-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1
        http://download.fedoralegacy.org/fedora/1/updates/i386/ImageMagick-per l-5.5.6-13.legacy.i386.rpm
        ImageMagick ImageMagick 6.2.0.3
        Mandriva ImageMagick-6.2.0.3-8.1.102mdk.i586.rpm
        Mandrakelinux 10.2:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-6.2.0.3-8.1.102mdk.src.rpm
        Mandrakelinux 10.2/X86_64:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-6.2.0.3-8.1.102mdk.src.rpm
        Mandrakelinux 10.2:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-6.2.0.3-8.1.102mdk.x86_64.rpm
        Mandrakelinux 10.2/X86_64:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-doc-6.2.0.3-8.1.102mdk.i586.rpm
        Mandrakelinux 10.2:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-doc-6.2.0.3-8.1.102mdk.x86_64.rpm
        Mandrakelinux 10.2/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64Magick8.0.2-6.2.0.3-8.1.102mdk.x86_64.rpm
        Mandrakelinux 10.2/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64Magick8.0.2-devel-6.2.0.3-8.1.102mdk.x86_64.rpm
        Mandrakelinux 10.2/X86_64:
        http://www.mandriva.com/en/download
        Mandriva libMagick8.0.2-6.2.0.3-8.1.102mdk.i586.rpm
        Mandrakelinux 10.2:
        http://www.mandriva.com/en/download
        Mandriva libMagick8.0.2-devel-6.2.0.3-8.1.102mdk.i586.rpm
        Mandrakelinux 10.2:
        http://www.mandriva.com/en/download
        Mandriva perl-Image-Magick-6.2.0.3-8.1.102mdk.i586.rpm
        Mandrakelinux 10.2:
        http://www.mandriva.com/en/download
        Mandriva perl-Image-Magick-6.2.0.3-8.1.102mdk.x86_64.rpm
        Mandrakelinux 10.2/X86_64:
        http://www.mandriva.com/en/download
        ImageMagick ImageMagick 6.0.4.4
        Mandriva ImageMagick-6.0.4.4-5.3.101mdk.i586.rpm
        Mandrakelinux 10.1:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-6.0.4.4-5.3.101mdk.src.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-6.0.4.4-5.3.101mdk.src.rpm
        Mandrakelinux 10.1:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-6.0.4.4-5.3.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-doc-6.0.4.4-5.3.101mdk.i586.rpm
        Mandrakelinux 10.1:
        http://www.mandriva.com/en/download
        Mandriva ImageMagick-doc-6.0.4.4-5.3.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64Magick6.4.0-6.0.4.4-5.3.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva lib64Magick6.4.0-devel-6.0.4.4-5.3.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        Mandriva libMagick6.4.0-6.0.4.4-5.3.101mdk.i586.rpm
        Mandrakelinux 10.1:
        http://www.mandriva.com/en/download
        Mandriva libMagick6.4.0-devel-6.0.4.4-5.3.101mdk.i586.rpm
        Mandrakelinux 10.1:
        http://www.mandriva.com/en/download
        Mandriva perl-Magick-6.0.4.4-5.3.101mdk.i586.rpm
        Mandrakelinux 10.1:
        http://www.mandriva.com/en/download
        Mandriva perl-Magick-6.0.4.4-5.3.101mdk.x86_64.rpm
        Mandrakelinux 10.1/X86_64:
        http://www.mandriva.com/en/download
        GraphicsMagick GraphicsMagick 1.0
        GraphicsMagick GraphicsMagick-1.1.6.tar.gz
        http://prdownloads.sourceforge.net/graphicsmagick/GraphicsMagick-1.1.6 .tar.gz?download
        GraphicsMagick GraphicsMagick 1.0.6
        GraphicsMagick GraphicsMagick-1.1.6.tar.gz
        http://prdownloads.sourceforge.net/graphicsmagick/GraphicsMagick-1.1.6 .tar.gz?download
        

- 漏洞信息

15891
ImageMagick /GraphicsMagick ReadPNMImage() PNM Image Decoding Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

ImageMagick contains a flaw that may allow a heap overflow triggering a denial of service. The issue is triggered due to a lack of bounds checking in the ReadPNMImage() function when decoding PNM images, and will result in loss of availability for the application.

- 时间线

2005-04-25 Unknow
2005-04-25 Unknow

- 解决方案

Upgrade ImageMagick to version 6.2.2 or higher, and GraphicsMagick to version 1.1.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

ImageMagick PNM Image Decoding Remote Buffer Overflow Vulnerability
Boundary Condition Error 13351
Yes No
2005-04-25 12:00:00 2007-03-08 03:15:00
Damian Put <pucik@overflow.pl> is credited with the discovery of this issue.

- 受影响的程序版本

Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Workstation 7.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux 10 F...
Turbolinux Home
Trustix Secure Linux 2.2
Trustix Secure Linux 2.1
Trustix Secure Enterprise Linux 2.0
SGI ProPack 3.0
SGI Advanced Linux Environment 3.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 3
RedHat Desktop 3.0
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 3
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 2.1 x86_64
MandrakeSoft Corporate Server 2.1
ImageMagick ImageMagick 6.2.1
ImageMagick ImageMagick 6.2 .0.7
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
ImageMagick ImageMagick 6.2 .0.4
+ Gentoo Linux
ImageMagick ImageMagick 6.2
ImageMagick ImageMagick 6.1.8
+ Gentoo Linux
ImageMagick ImageMagick 6.1.7
ImageMagick ImageMagick 6.1.6
ImageMagick ImageMagick 6.1.5
ImageMagick ImageMagick 6.1.4
ImageMagick ImageMagick 6.1.3
ImageMagick ImageMagick 6.1.2
ImageMagick ImageMagick 6.1.1
ImageMagick ImageMagick 6.1
ImageMagick ImageMagick 6.0.8
ImageMagick ImageMagick 6.0.7
+ Red Hat Enterprise Linux AS 4
+ RedHat Desktop 4.0
+ RedHat Enterprise Linux Desktop version 4
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux WS 4
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
ImageMagick ImageMagick 6.0.6
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
ImageMagick ImageMagick 6.0.5
+ Turbolinux Home
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Server 10.0
ImageMagick ImageMagick 6.0.4
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
ImageMagick ImageMagick 6.0.3
ImageMagick ImageMagick 6.0.2 .5
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
ImageMagick ImageMagick 6.0.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
ImageMagick ImageMagick 6.0.1
ImageMagick ImageMagick 6.0
ImageMagick ImageMagick 6.2.9.2
ImageMagick ImageMagick 6.2.0.3
ImageMagick ImageMagick 6.0.4.4
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
ImageMagick ImageMagick 5.5.7.15
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
ImageMagick ImageMagick 5.4.2.3
+ Turbolinux Turbolinux Workstation 8.0
GraphicsMagick GraphicsMagick 1.1.5
GraphicsMagick GraphicsMagick 1.1.5
+ Gentoo Linux
GraphicsMagick GraphicsMagick 1.1.4
GraphicsMagick GraphicsMagick 1.1.3
GraphicsMagick GraphicsMagick 1.1
GraphicsMagick GraphicsMagick 1.0.6
GraphicsMagick GraphicsMagick 1.0
ImageMagick ImageMagick 6.2.2
+ Gentoo Linux
GraphicsMagick GraphicsMagick 1.1.6
+ Gentoo Linux

- 不受影响的程序版本

ImageMagick ImageMagick 6.2.2
+ Gentoo Linux
GraphicsMagick GraphicsMagick 1.1.6
+ Gentoo Linux

- 漏洞讨论

A remotely exploitable client-side buffer-overflow vulnerability affects ImageMagick. This issue occurs because the application fails to properly validate the length of user-supplied strings before copying them into static process buffers.

An attacker may exploit this issue to cause the affected application to crash, potentially destroying unsaved data, ultimately denying service to legitimate users.

- 漏洞利用

The following command will craft a malicious file designed to leverage this issue:

perl -e 'print "P7\n1\n1 1\n1"' > vuln.pnm

- 解决方案

The vendor has released an upgrade dealing with this issue. Please see the referenced advisories for more information.


ImageMagick ImageMagick 5.5.7.15

Red Hat Fedora Core2

Red Hat Fedora Core1

ImageMagick ImageMagick 6.2.0.3

ImageMagick ImageMagick 6.0.4.4

GraphicsMagick GraphicsMagick 1.0

GraphicsMagick GraphicsMagick 1.0.6

GraphicsMagick GraphicsMagick 1.1

GraphicsMagick GraphicsMagick 1.1.3

GraphicsMagick GraphicsMagick 1.1.4

GraphicsMagick GraphicsMagick 1.1.5

GraphicsMagick GraphicsMagick 1.1.5

ImageMagick ImageMagick 6.0

ImageMagick ImageMagick 6.0.1

ImageMagick ImageMagick 6.0.2

ImageMagick ImageMagick 6.0.2 .5

ImageMagick ImageMagick 6.0.3

ImageMagick ImageMagick 6.0.4

ImageMagick ImageMagick 6.0.5

ImageMagick ImageMagick 6.0.6

ImageMagick ImageMagick 6.0.7

ImageMagick ImageMagick 6.0.8

ImageMagick ImageMagick 6.1

ImageMagick ImageMagick 6.1.1

ImageMagick ImageMagick 6.1.2

ImageMagick ImageMagick 6.1.3

ImageMagick ImageMagick 6.1.4

ImageMagick ImageMagick 6.1.5

ImageMagick ImageMagick 6.1.6

ImageMagick ImageMagick 6.1.7

ImageMagick ImageMagick 6.1.8

ImageMagick ImageMagick 6.2 .0.4

ImageMagick ImageMagick 6.2 .0.7

ImageMagick ImageMagick 6.2

ImageMagick ImageMagick 6.2.1

RedHat Linux 7.3 i386

RedHat Linux 7.3 i686

RedHat Linux 7.3

RedHat Linux 9.0 i386

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站