CVE-2010-4167
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/11/2010
Last modified:
11/04/2025
Description
Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* | 6.6.5-4 (including) | |
| cpe:2.3:a:imagemagick:imagemagick:6.3.1-6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.1-7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.2-8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.3-1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:imagemagick:imagemagick:6.3.3-2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601824
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052515.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052599.html
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://secunia.com/advisories/42497
- http://secunia.com/advisories/42744
- http://secunia.com/advisories/48100
- http://secunia.com/advisories/49063
- http://www.imagemagick.org/script/changelog.php
- http://www.openwall.com/lists/oss-security/2010/11/13/1
- http://www.openwall.com/lists/oss-security/2010/11/15/3
- http://www.securityfocus.com/bid/45044
- http://www.ubuntu.com/usn/USN-1028-1
- http://www.vupen.com/english/advisories/2010/3150
- http://www.vupen.com/english/advisories/2010/3322
- https://bugzilla.redhat.com/show_bug.cgi?id=652860
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601824
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052515.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052599.html
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://secunia.com/advisories/42497
- http://secunia.com/advisories/42744
- http://secunia.com/advisories/48100
- http://secunia.com/advisories/49063
- http://www.imagemagick.org/script/changelog.php
- http://www.openwall.com/lists/oss-security/2010/11/13/1
- http://www.openwall.com/lists/oss-security/2010/11/15/3
- http://www.securityfocus.com/bid/45044
- http://www.ubuntu.com/usn/USN-1028-1
- http://www.vupen.com/english/advisories/2010/3150
- http://www.vupen.com/english/advisories/2010/3322
- https://bugzilla.redhat.com/show_bug.cgi?id=652860



