MDKSA-2005:107 - Updated ImageMagick packages fix vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Update Advisory
_______________________________________________________________________
Package name: ImageMagick
Advisory ID: MDKSA-2005:107
Date: June 28th, 2005
Affected versions: 10.1, 10.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________
Problem Description:
A heap-based buffer overflow was found in the way that ImageMagick
parses PNM files. If an attacker can trick a victim into opening
a specially crafted PNM file, the attacker could execute arbitrary
code on the victim's machine (CAN-2005-1275).
As well, a Denial of Service vulnerability was found in the way
that ImageMagick parses XWD files. If a user or program executed
ImageMagick to process a malicious XWD file, ImageMagick will enter
info an infinite loop causing a DoS (CAN-2005-1739).
The updated packages have been patched to fix these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1739
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.1:
7204ab3971632313f7ae847da62af4c5
10.1/RPMS/ImageMagick-6.0.4.4-5.3.101mdk.i586.rpm
bff95b521ea8c8e2a159495c25e51efc
10.1/RPMS/ImageMagick-doc-6.0.4.4-5.3.101mdk.i586.rpm
d65c0c50a3d40ceac62bae4fe0088ecb
10.1/RPMS/libMagick6.4.0-6.0.4.4-5.3.101mdk.i586.rpm
878c21b19aa7afebdaa779b9b3ef71d3
10.1/RPMS/libMagick6.4.0-devel-6.0.4.4-5.3.101mdk.i586.rpm
5c5fc0b42c710313e8e6d42628ab70b5
10.1/RPMS/perl-Magick-6.0.4.4-5.3.101mdk.i586.rpm
d68f51a677e771ae20b4ff91d1792773
10.1/SRPMS/ImageMagick-6.0.4.4-5.3.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
798ffe25847a9c9e0cc3592c9eb01860
x86_64/10.1/RPMS/ImageMagick-6.0.4.4-5.3.101mdk.x86_64.rpm
ef92b2e22fa6ac4c9d39b84412d1f115
x86_64/10.1/RPMS/ImageMagick-doc-6.0.4.4-5.3.101mdk.x86_64.rpm
e5653abbf08119cabba8535b6aa988d9
x86_64/10.1/RPMS/lib64Magick6.4.0-6.0.4.4-5.3.101mdk.x86_64.rpm
c364fae31c3dd29641bda09bccf283fe
x86_64/10.1/RPMS/lib64Magick6.4.0-devel-6.0.4.4-5.3.101mdk.x86_64.rpm
0a65d39ff4b976c45ace888f62c6a73e
x86_64/10.1/RPMS/perl-Magick-6.0.4.4-5.3.101mdk.x86_64.rpm
d68f51a677e771ae20b4ff91d1792773
x86_64/10.1/SRPMS/ImageMagick-6.0.4.4-5.3.101mdk.src.rpm
Mandrakelinux 10.2:
9a9011f107558829fcb232fd85d556dc
10.2/RPMS/ImageMagick-6.2.0.3-8.1.102mdk.i586.rpm
47c28aa693bd83166100451b958dd3b8
10.2/RPMS/ImageMagick-doc-6.2.0.3-8.1.102mdk.i586.rpm
d0844c92f73aef8e29a12e2cc8c3d946
10.2/RPMS/libMagick8.0.2-6.2.0.3-8.1.102mdk.i586.rpm
5c7640c27cea8164a42d5f3048c4aac3
10.2/RPMS/libMagick8.0.2-devel-6.2.0.3-8.1.102mdk.i586.rpm
eecc10db3e0633056039b7e3b6c0269b
10.2/RPMS/perl-Image-Magick-6.2.0.3-8.1.102mdk.i586.rpm
a0107084465ecdd25a967bc865282c8e
10.2/SRPMS/ImageMagick-6.2.0.3-8.1.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
6b7cc28d1fdb66d0eda4206f2b47deff
x86_64/10.2/RPMS/ImageMagick-6.2.0.3-8.1.102mdk.x86_64.rpm
6864d0102bfb382d997c0325a80ba199
x86_64/10.2/RPMS/ImageMagick-doc-6.2.0.3-8.1.102mdk.x86_64.rpm
5efd08cab8bbb20c4fb736f01d11aab0
x86_64/10.2/RPMS/lib64Magick8.0.2-6.2.0.3-8.1.102mdk.x86_64.rpm
408fd0dd00b46295a7aff30dc5271c43
x86_64/10.2/RPMS/lib64Magick8.0.2-devel-6.2.0.3-8.1.102mdk.x86_64.rpm
d6d790e26c405512a1ab7000cbb8ea02
x86_64/10.2/RPMS/perl-Image-Magick-6.2.0.3-8.1.102mdk.x86_64.rpm
a0107084465ecdd25a967bc865282c8e
x86_64/10.2/SRPMS/ImageMagick-6.2.0.3-8.1.102mdk.src.rpm
Corporate Server 2.1:
404ebb17078c3f09a86217afdb958407
corporate/2.1/RPMS/ImageMagick-5.4.8.3-2.4.C21mdk.i586.rpm
7aec358404c3c43708bd171f93abda6a
corporate/2.1/RPMS/libMagick5-5.4.8.3-2.4.C21mdk.i586.rpm
d89eef776bb0709fb7834aa2caa9df83
corporate/2.1/RPMS/libMagick5-devel-5.4.8.3-2.4.C21mdk.i586.rpm
b2d796af8410f867f3f02f16b977e646
corporate/2.1/RPMS/perl-Magick-5.4.8.3-2.4.C21mdk.i586.rpm
fc428f61f00a13dab91a583bf7c037b1
corporate/2.1/SRPMS/ImageMagick-5.4.8.3-2.4.C21mdk.src.rpm
Corporate Server 2.1/X86_64:
24db2c7377eeecfcb6bff42835a5408e
x86_64/corporate/2.1/RPMS/ImageMagick-5.4.8.3-2.4.C21mdk.x86_64.rpm
aa24822cb61e3013cc231e9b32b7c239
x86_64/corporate/2.1/RPMS/libMagick5-5.4.8.3-2.4.C21mdk.x86_64.rpm
7b7086a467ee0b3ef2db9158b37026c8
x86_64/corporate/2.1/RPMS/libMagick5-devel-5.4.8.3-2.4.C21mdk.x86_64.rpm
ebfffce996bf42b1def96109449da752
x86_64/corporate/2.1/RPMS/perl-Magick-5.4.8.3-2.4.C21mdk.x86_64.rpm
fc428f61f00a13dab91a583bf7c037b1
x86_64/corporate/2.1/SRPMS/ImageMagick-5.4.8.3-2.4.C21mdk.src.rpm
Corporate 3.0:
7c8ac61f65fb056784da754055f29e98
corporate/3.0/RPMS/ImageMagick-5.5.7.15-6.4.C30mdk.i586.rpm
4c353e45b5b324533149042836076e0a
corporate/3.0/RPMS/ImageMagick-doc-5.5.7.15-6.4.C30mdk.i586.rpm
1f4a50bf076d4eb0c09130f5e1fb663b
corporate/3.0/RPMS/libMagick5.5.7-5.5.7.15-6.4.C30mdk.i586.rpm
56c938c54a8e032a72f38bbdbfce0c6b
corporate/3.0/RPMS/libMagick5.5.7-devel-5.5.7.15-6.4.C30mdk.i586.rpm
1a7ef96b56e35e9afbe2b33a02e2eeba
corporate/3.0/RPMS/perl-Magick-5.5.7.15-6.4.C30mdk.i586.rpm
478a29a256c3418fe826746f761f9dd0
corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.4.C30mdk.src.rpm
Corporate 3.0/X86_64:
cb784d42be12ece05ad872a45da61e3d
x86_64/corporate/3.0/RPMS/ImageMagick-5.5.7.15-6.4.C30mdk.x86_64.rpm
076932dfe4a0975c14f7f6027ed650dd
x86_64/corporate/3.0/RPMS/ImageMagick-doc-5.5.7.15-6.4.C30mdk.x86_64.rpm
4ee3b5ffb7aa2496e1ad6448d23e48db
x86_64/corporate/3.0/RPMS/lib64Magick5.5.7-5.5.7.15-6.4.C30mdk.x86_64.rpm
eb7d4c0aa93e759890c906fe3a89f43c
x86_64/corporate/3.0/RPMS/lib64Magick5.5.7-devel-5.5.7.15-6.4.C30mdk.x86_64.rpm
a20da02a6fd0d101ff7166c836f5da91
x86_64/corporate/3.0/RPMS/perl-Magick-5.5.7.15-6.4.C30mdk.x86_64.rpm
478a29a256c3418fe826746f761f9dd0
x86_64/corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.4.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFCwbOcmqjQ0CJFipgRAo3AAJ4vO8Oy8yjSNJa4XlQTkC3V53TBRACeNzqg
lEQSLcV9DD+pkBjjbWHBLpQ=
=ZDkd
-----END PGP SIGNATURE-----