CVE-2006-5456
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
23/10/2006
Última modificación:
09/04/2025
Descripción
Múltiples desbordamientos de búfer en GraphicsMagick anterior a 1.1.7 e ImageMagick 6.0.7 permiten a atacantes con intervención del usuario provocar una denegación de servicio y posiblemente ejecutar código de su elección mediante (1) una imagen DCM que no es manejada adecuadamente por la función ReadDCMImage en coders/dcm.c, o (2) una imagen PALM que no es manejada adecuadamente por la función ReadPALMImage en coders/palm.c.
Impacto
Puntuación base 2.0
5.10
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:* | 1.1.6 (incluyendo) | |
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
- http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
- http://secunia.com/advisories/22569
- http://secunia.com/advisories/22572
- http://secunia.com/advisories/22601
- http://secunia.com/advisories/22604
- http://secunia.com/advisories/22819
- http://secunia.com/advisories/22834
- http://secunia.com/advisories/22998
- http://secunia.com/advisories/23090
- http://secunia.com/advisories/23121
- http://secunia.com/advisories/24186
- http://secunia.com/advisories/24196
- http://secunia.com/advisories/24284
- http://secunia.com/advisories/24458
- http://security.gentoo.org/glsa/glsa-200611-07.xml
- http://security.gentoo.org/glsa/glsa-200611-19.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092
- http://www.debian.org/security/2006/dsa-1213
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A193
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A041
- http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html
- http://www.novell.com/linux/security/advisories/2007_3_sr.html
- http://www.osvdb.org/29990
- http://www.redhat.com/support/errata/RHSA-2007-0015.html
- http://www.securityfocus.com/archive/1/452718/100/100/threaded
- http://www.securityfocus.com/archive/1/459507/100/0/threaded
- http://www.securityfocus.com/bid/20707
- http://www.ubuntu.com/usn/usn-372-1
- http://www.ubuntu.com/usn/usn-422-1
- http://www.vupen.com/english/advisories/2006/4170
- http://www.vupen.com/english/advisories/2006/4171
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29816
- https://issues.rpath.com/browse/RPL-1034
- https://issues.rpath.com/browse/RPL-811
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765
- ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
- http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
- http://secunia.com/advisories/22569
- http://secunia.com/advisories/22572
- http://secunia.com/advisories/22601
- http://secunia.com/advisories/22604
- http://secunia.com/advisories/22819
- http://secunia.com/advisories/22834
- http://secunia.com/advisories/22998
- http://secunia.com/advisories/23090
- http://secunia.com/advisories/23121
- http://secunia.com/advisories/24186
- http://secunia.com/advisories/24196
- http://secunia.com/advisories/24284
- http://secunia.com/advisories/24458
- http://security.gentoo.org/glsa/glsa-200611-07.xml
- http://security.gentoo.org/glsa/glsa-200611-19.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092
- http://www.debian.org/security/2006/dsa-1213
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A193
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A041
- http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html
- http://www.novell.com/linux/security/advisories/2007_3_sr.html
- http://www.osvdb.org/29990
- http://www.redhat.com/support/errata/RHSA-2007-0015.html
- http://www.securityfocus.com/archive/1/452718/100/100/threaded
- http://www.securityfocus.com/archive/1/459507/100/0/threaded
- http://www.securityfocus.com/bid/20707
- http://www.ubuntu.com/usn/usn-372-1
- http://www.ubuntu.com/usn/usn-422-1
- http://www.vupen.com/english/advisories/2006/4170
- http://www.vupen.com/english/advisories/2006/4171
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29816
- https://issues.rpath.com/browse/RPL-1034
- https://issues.rpath.com/browse/RPL-811
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765