发布时间 :2006-01-04 18:03:00
修订时间 :2017-10-10 21:30:35

[原文]Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier such as %d in the file name, a variant of CVE-2005-0397, and as demonstrated using the convert program.


        ImageMagick 6.2.3和其他版本以及GraphicsMagick中的image.c的SetImageInfo函数中的格式化字符串漏洞,可让需要用户协助的攻击者通过文件名中的数值格式化字符串说明符(如%d)使系统拒绝服务(崩溃),并可能执行任意代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-134 []

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10717Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows use...

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  SGI  20060301-01-U
(PATCH)  SLACKWARE  SSA:2006-045-03
(UNKNOWN)  BUGTRAQ  20061127 rPSA-2006-0218-1 ImageMagick
(PATCH)  BID  12717

- 漏洞信息

中危 格式化字符串
2006-01-04 00:00:00 2006-08-28 00:00:00
        ImageMagick 6.2.3和其他版本以及GraphicsMagick中的image.c的SetImageInfo函数中的格式化字符串漏洞,可让需要用户协助的攻击者通过文件名中的数值格式化字符串说明符(如%d)使系统拒绝服务(崩溃),并可能执行任意代码。

- 公告与补丁

        Sun Solaris 10
        Sun 136882-01 -136882-01-1
        RedHat Fedora Core2
        Fedora ImageMagick-
        RedHat Fedora Core 2 .0.7-2.fc2.4.legacy.i386.rpm
        Fedora ImageMagick-c++-
        RedHat Fedora Core 2 -
        Fedora ImageMagick-c++-devel-
        RedHat Fedora Core 2 -devel-
        Fedora ImageMagick-devel-
        RedHat Fedora Core 2 el-
        Fedora ImageMagick-perl-
        RedHat Fedora Core 2 l-
        RedHat Fedora Core1
        Fedora ImageMagick-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1 .6-13.legacy.i386.rpm
        Fedora ImageMagick-c++-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1 -5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-c++-devel-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1 -devel-5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-devel-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1 el-5.5.6-13.legacy.i386.rpm
        Fedora ImageMagick-perl-5.5.6-13.legacy.i386.rpm
        RedHat Fedora Core 1 l-5.5.6-13.legacy.i386.rpm
        Sun Solaris 10_x86
        Sun 136883-01 -136883-01-1
        ImageMagick ImageMagick 5.4.4 .5
        Debian imagemagick_5.4.4.5-1woody6_alpha.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_alpha.deb
        Debian imagemagick_5.4.4.5-1woody6_arm.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_arm.deb
        Debian imagemagick_5.4.4.5-1woody6_hppa.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_hppa.deb
        Debian imagemagick_5.4.4.5-1woody6_i386.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_i386.deb
        Debian imagemagick_5.4.4.5-1woody6_ia64.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_ia64.deb
        Debian imagemagick_5.4.4.5-1woody6_m68k.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_m68k.deb
        Debian imagemagick_5.4.4.5-1woody6_mips.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_mips.deb
        Debian imagemagick_5.4.4.5-1woody6_mipsel.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_mipsel.deb
        Debian imagemagick_5.4.4.5-1woody6_powerpc.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_powerpc.deb
        Debian imagemagick_5.4.4.5-1woody6_s390.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_s390.deb
        Debian imagemagick_5.4.4.5-1woody6_sparc.deb
        Debian GNU/Linux 3.0 alias woody _5.4.4.5-1woody6_sparc.deb

- 漏洞信息 (F52336)

Debian Linux Security Advisory 1213-1 (PacketStormID:F52336)
2006-11-20 00:00:00

Debian Security Advisory 1213-1 - Several remote vulnerabilities have been discovered in Imagemagick, a collection of image manipulation programs, which may lead to the execution of arbitrary code.

Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1213-1                                   Moritz Muehlenhoff
November 19th, 2006           
- --------------------------------------------------------------------------

Package        : imagemagick
Vulnerability  : several
Problem-Type   : local(remote)
Debian-specific: no
CVE ID         : CVE-2006-0082 CVE-2006-4144 CVE-2006-5456 CVE-2006-5868
Debian Bug     : 345876 383314 393025

Several remote vulnerabilities have been discovered in Imagemagick,
a collection of image manipulation programs, which may lead to the
execution of arbitrary code. The Common Vulnerabilities and Exposures
project identifies the following problems:


    Daniel Kobras discovered that Imagemagick is vulnerable to format
    string attacks in the filename parsing code.


    Damian Put discovered that Imagemagick is vulnerable to buffer
    overflows in the module for SGI images.


    M Joonas Pihlaja discovered that Imagemagick is vulnerable to buffer
    overflows in the module for DCM and PALM images.


    Daniel Kobras discovered that Imagemagick is vulnerable to buffer
    overflows in the module for SGI images.

This update also adresses regressions in the XCF codec, which were
introduced in the previous security update.

For the stable distribution (sarge) these problems have been fixed in
version 6:

For the upcoming stable distribution (etch) these problems have been
fixed in version 7:

For the unstable distribution (sid) these problems have been fixed in
version 7:

We recommend that you upgrade your imagemagick packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      881 0f3c7174962dcaf0be7b3027312d3438
      Size/MD5 checksum:   142001 c2be91d527c1714ee0ece93b090792c7
      Size/MD5 checksum:  6824001 477a361ba0154cc2423726fab4a3f57c

  Alpha architecture:
      Size/MD5 checksum:  1469720 b311ede0075f36157e9c9c244a382cb6
      Size/MD5 checksum:   173974 34306082902f34914d4d0823f0e153c8
      Size/MD5 checksum:   288800 fa2b7d2ad5708e66fbc5c14f830bace0
      Size/MD5 checksum:  1285588 cabe582c14962459c8bc8dffc7d3a516
      Size/MD5 checksum:  2204442 080e9f6d25c7b1f1df10dd1828f85273
      Size/MD5 checksum:   143902 98099204464269c5386244cb1fee775f

  AMD64 architecture:
      Size/MD5 checksum:  1466352 d50a197f3c3f0e15f1530d56177a1c72
      Size/MD5 checksum:   163602 642d806539f42d3bd3645edb021bae16
      Size/MD5 checksum:   228744 9b7c462060e0769f1561da5dcfb32dee
      Size/MD5 checksum:  1194980 51182a82a05f1f47c435f246a21469ad
      Size/MD5 checksum:  1550348 43d9d80bd42b3dc6f6d611a997a17c2e
      Size/MD5 checksum:   231800 6375c61e8edc60fa928665cf45ec011c

  ARM architecture:
      Size/MD5 checksum:  1466148 a0c6fcb562afa6d5f8736beda4dade43
      Size/MD5 checksum:   149342 9a184c8f6d3d204748ed30a1c57dbd1f
      Size/MD5 checksum:   234806 0d4865aaf1dd850604ce9b728e65def6
      Size/MD5 checksum:  1204646 02fbc1c7b8b98d1977e4861211f1255a
      Size/MD5 checksum:  1647698 cef197d1c2ce919413ab12bd1b99187a
      Size/MD5 checksum:   230484 5b5dbe487dc580a5f164cf862552ab4d

  HP Precision architecture:
      Size/MD5 checksum:  1468290 329777db0d2b061398268f9fd8d6a7a7
      Size/MD5 checksum:   182170 e190aad821d4e96ba2b84fc4d3b49da8
      Size/MD5 checksum:   273890 434201d0f53175e739ce45addbe2ce01
      Size/MD5 checksum:  1404728 cfe2739dac2b84497a00f92b5c4b36ad
      Size/MD5 checksum:  1827810 14e7e2febd80f1551cfa9b035ed9222c
      Size/MD5 checksum:   243804 e4bfc17d51547976f7f4db09f6cc6997

  Intel IA-32 architecture:
      Size/MD5 checksum:  1466106 0ee2e904990dbcbeee0b90c2fa95ac62
      Size/MD5 checksum:   164440 708d64c7a92419a98e7d305089b1b0c4
      Size/MD5 checksum:   208932 eed51be1f03a91e624194e9dea211ff2
      Size/MD5 checksum:  1172262 22f32c18dc71c7b24eff16f1fec1c243
      Size/MD5 checksum:  1507516 ea9e1148fa72e6be94462a46d30304b0
      Size/MD5 checksum:   233964 e47cbf76b993c0eb44adcf85e125d75c

  Intel IA-64 architecture:
      Size/MD5 checksum:  1468472 6b31e556cf944fe2d89ad8d2c09cc43a
      Size/MD5 checksum:   188272 7bf4012fe64aa60c8aac88b263b620c4
      Size/MD5 checksum:   295958 dcf1b145b868414bd2357d21ace70fb2
      Size/MD5 checksum:  1605554 7ab0f7944f25bbaca6266e3bce816132
      Size/MD5 checksum:  2132552 7324f4a81b5496cc7c9182ae2bb082fb
      Size/MD5 checksum:   273506 fa943563a08e04b06c0632afe7f4bc92

  Motorola 680x0 architecture:
      Size/MD5 checksum:  1466154 1f5c2b36763032352c2b45144517a5b8
      Size/MD5 checksum:   159998 624ebcd80f960f7227095411cbdfb90c
      Size/MD5 checksum:   210680 91b3bafec7f54823cb2720966fcc4825
      Size/MD5 checksum:  1073256 b7f77626db0631d990422a3cae43f517
      Size/MD5 checksum:  1288834 fd7af651e4d2d5124b45228d30dc6737
      Size/MD5 checksum:   226942 f097f5c845a1159029271cba7112141f

  Big endian MIPS architecture:
      Size/MD5 checksum:  1490232 6aff49b4b30fc146abde3fcbefe85d5f
      Size/MD5 checksum:   155500 416074125be015d5c49a90ac032c5182
      Size/MD5 checksum:   254800 b8f762578afa79b0210dec43547917a4
      Size/MD5 checksum:  1119320 6c778533f22c4f7e7c1dd268b5b59c3a
      Size/MD5 checksum:  1704446 6855a0354042ab9b283bc3966f4f665f
      Size/MD5 checksum:   131304 74185bb1115a3bcd50085df4fac2e50f

  Little endian MIPS architecture:
      Size/MD5 checksum:  1490202 bd3a8c344eb9927d656543c20d784f38
      Size/MD5 checksum:   151598 d903083280a2428e35516444c93c7d03
      Size/MD5 checksum:   250056 7c7c6a65f433eee855e775b2e4eafcf3
      Size/MD5 checksum:  1114750 13012fdd898b1aa77267f90b73563e50
      Size/MD5 checksum:  1667906 1aeb160d222b005e4103c715d964b0db
      Size/MD5 checksum:   130912 84b347ac516de3a89060c2e010a63cf0

  PowerPC architecture:
      Size/MD5 checksum:  1471774 5e218bb6d5e36cf50c80ebbf77a56abe
      Size/MD5 checksum:   156748 4564f4918218c6e6c60fe587fd25d118
      Size/MD5 checksum:   227722 5eba56a195be2aca1354fce454293a9f
      Size/MD5 checksum:  1169510 92e5f7ca8fdf727e3a88a48262219c8e
      Size/MD5 checksum:  1684852 dc528d0a8080493c028bfca9665dcca3
      Size/MD5 checksum:   270502 cc408c569b2ce9d03576b4bd9bcb0cb0

  IBM S/390 architecture:
      Size/MD5 checksum:  1467494 d1a9308491175f690a73f720caa7532b
      Size/MD5 checksum:   180486 6693ec2651a6f959a7f3f08efbeeea6f
      Size/MD5 checksum:   230182 93a55b0f22a8339b13e2816a970ca102
      Size/MD5 checksum:  1194334 e93c9333e1adc98bb7b99e6d2904d995
      Size/MD5 checksum:  1530886 db33e6bb01f6d927c02053f0cdd4bf89
      Size/MD5 checksum:   242114 51baccefbc53499f3514911521d76c76

  Sun Sparc architecture:
      Size/MD5 checksum:  1465694 d77c64a8e1c40678070a79011abcb8a5
      Size/MD5 checksum:   161036 dadfff14cc51b0fb9561bf6469b61a3e
      Size/MD5 checksum:   224332 c8ebb9dbff86871dc12e3d5ae275bc12
      Size/MD5 checksum:  1249156 461cd22009434968fd4011481ce01044
      Size/MD5 checksum:  1684366 00b473e9bf9e417a4f0bcff753ed727b
      Size/MD5 checksum:   230898 020b71df283f6391f3a15415be45a375

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>
Version: GnuPG v1.4.5 (GNU/Linux)


Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

- 漏洞信息

ImageMagick File Name Handling Numeric Format String
Local / Remote, Context Dependent Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-01-04 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete