Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1097

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-1097
Last Modified 24 Nov 2013 10:38:01
Published 05 Mar 2008 03:44:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-1097

Summary

Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.

Vulnerable Systems

Application

  • Imagemagick 6.2.8.0

  • Imagemagick 6.2.8.1

  • Imagemagick 6.2.8.2

  • Imagemagick 6.2.8.3

  • Imagemagick Graphicsmagick 1.1.10

  • Imagemagick Graphicsmagick 1.1.11

  • Imagemagick Graphicsmagick 1.1.12

  • Imagemagick Graphicsmagick 1.1.7

  • Imagemagick Graphicsmagick 1.1.8

  • Imagemagick Graphicsmagick 1.1.9


References

MISC - https://bugzilla.redhat.com/show_bug.cgi?id=285861

XF - imagemagick-readpcximage-bo(41193)

SECTRACK - 1019881

REDHAT - RHSA-2008:0165

REDHAT - RHSA-2008:0145

DEBIAN - DSA-1858

SECUNIA - 36260

SECUNIA - 30967

OSVDB - 43213

SUSE - SUSE-SR:2008:014

CONFIRM - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413034

BID - 28822

MANDRIVA - MDVSA-2008:099

SECUNIA - 29857

SECUNIA - 29786

GENTOO - GLSA-201311-10

SECUNIA - 55721


Last Updated: 27 May 2016 11:03:20