Skip to navigation

Security Advisory Moderate: ImageMagick security update

Advisory: RHSA-2008:0165-4
Type: Security Advisory
Severity: Moderate
Issued on: 2008-04-16
Last updated on: 2008-04-16
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2007-1797
CVE-2007-4985
CVE-2007-4986
CVE-2008-1097

Details

Updated ImageMagick packages that correct several security issues are now
available for Red Hat Enterprise Linux version 2.1.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

ImageMagick is an image display and manipulation tool for the X Window
System that can read and write multiple image formats.

Several heap-based buffer overflow flaws were found in ImageMagick. If a
victim opened a specially-crafted DCM or XWD file, an attacker could
potentially execute arbitrary code on the victim's machine. (CVE-2007-1797)

Several denial of service flaws were found in ImageMagick's parsing of XCF
and DCM files. Attempting to process a specially crafted input file in
these formats could cause ImageMagick to enter an infinite loop.
(CVE-2007-4985)

Several integer overflow flaws were found in ImageMagick. If a victim
opened a specially-crafted DCM, DIB, XBM, XCF or XWD file, an attacker
could potentially execute arbitrary code with the privileges of the user
running ImageMagick. (CVE-2007-4986)

A heap-based buffer overflow flaw was found in ImageMagick's processing of
certain malformed PCX images. If a victim opened a specially-crafted PCX
file, an attacker could possibly execute arbitrary code with the privileges
of the user running ImageMagick.. (CVE-2008-1097)

All users of ImageMagick should upgrade to these updated packages, which
contain backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/SRPMS/ImageMagick-5.3.8-21.src.rpm
Missing file
    MD5: 0e7dd437d33281c4c35acf1a59a94949
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/i386/ImageMagick-5.3.8-21.i386.rpm
Missing file
    MD5: e863b62376c930b9aeb1cfa236b5633f
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++/5.3.8-21/i386/ImageMagick-c++-5.3.8-21.i386.rpm
Missing file
    MD5: d9ab4b3747525f50c4c88e7ecd9ab5f7
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++-devel/5.3.8-21/i386/ImageMagick-c++-devel-5.3.8-21.i386.rpm
Missing file
    MD5: 64d3777fa0546f0532e2d120af7d4654
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-devel/5.3.8-21/i386/ImageMagick-devel-5.3.8-21.i386.rpm
Missing file
    MD5: fd96dc976dba17b5929167fd6b5de42a
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-perl/5.3.8-21/i386/ImageMagick-perl-5.3.8-21.i386.rpm
Missing file
    MD5: a4bb098ac81e01e7d3768af12673f37c
 
IA-64:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/ia64/ImageMagick-5.3.8-21.ia64.rpm
Missing file
    MD5: e262805fe649b5268f4754e8b4a9471f
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++/5.3.8-21/ia64/ImageMagick-c++-5.3.8-21.ia64.rpm
Missing file
    MD5: cf0af94d420ca9a865adfd7e78bff8e9
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++-devel/5.3.8-21/ia64/ImageMagick-c++-devel-5.3.8-21.ia64.rpm
Missing file
    MD5: 4c1251376d23bea7d6fa15d1f97f5101
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-devel/5.3.8-21/ia64/ImageMagick-devel-5.3.8-21.ia64.rpm
Missing file
    MD5: 06ad3d2bfafc755705503205b3dc7685
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-perl/5.3.8-21/ia64/ImageMagick-perl-5.3.8-21.ia64.rpm
Missing file
    MD5: 793e001019fd9fbd61a0e0825502464c
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/SRPMS/ImageMagick-5.3.8-21.src.rpm
Missing file
    MD5: 0e7dd437d33281c4c35acf1a59a94949
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/i386/ImageMagick-5.3.8-21.i386.rpm
Missing file
    MD5: e863b62376c930b9aeb1cfa236b5633f
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++/5.3.8-21/i386/ImageMagick-c++-5.3.8-21.i386.rpm
Missing file
    MD5: d9ab4b3747525f50c4c88e7ecd9ab5f7
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++-devel/5.3.8-21/i386/ImageMagick-c++-devel-5.3.8-21.i386.rpm
Missing file
    MD5: 64d3777fa0546f0532e2d120af7d4654
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-devel/5.3.8-21/i386/ImageMagick-devel-5.3.8-21.i386.rpm
Missing file
    MD5: fd96dc976dba17b5929167fd6b5de42a
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-perl/5.3.8-21/i386/ImageMagick-perl-5.3.8-21.i386.rpm
Missing file
    MD5: a4bb098ac81e01e7d3768af12673f37c
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/SRPMS/ImageMagick-5.3.8-21.src.rpm
Missing file
    MD5: 0e7dd437d33281c4c35acf1a59a94949
 
IA-32:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/i386/ImageMagick-5.3.8-21.i386.rpm
Missing file
    MD5: e863b62376c930b9aeb1cfa236b5633f
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++/5.3.8-21/i386/ImageMagick-c++-5.3.8-21.i386.rpm
Missing file
    MD5: d9ab4b3747525f50c4c88e7ecd9ab5f7
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++-devel/5.3.8-21/i386/ImageMagick-c++-devel-5.3.8-21.i386.rpm
Missing file
    MD5: 64d3777fa0546f0532e2d120af7d4654
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-devel/5.3.8-21/i386/ImageMagick-devel-5.3.8-21.i386.rpm
Missing file
    MD5: fd96dc976dba17b5929167fd6b5de42a
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-perl/5.3.8-21/i386/ImageMagick-perl-5.3.8-21.i386.rpm
Missing file
    MD5: a4bb098ac81e01e7d3768af12673f37c
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/SRPMS/ImageMagick-5.3.8-21.src.rpm
Missing file
    MD5: 0e7dd437d33281c4c35acf1a59a94949
 
IA-64:
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick/5.3.8-21/ia64/ImageMagick-5.3.8-21.ia64.rpm
Missing file
    MD5: e262805fe649b5268f4754e8b4a9471f
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++/5.3.8-21/ia64/ImageMagick-c++-5.3.8-21.ia64.rpm
Missing file
    MD5: cf0af94d420ca9a865adfd7e78bff8e9
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-c++-devel/5.3.8-21/ia64/ImageMagick-c++-devel-5.3.8-21.ia64.rpm
Missing file
    MD5: 4c1251376d23bea7d6fa15d1f97f5101
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-devel/5.3.8-21/ia64/ImageMagick-devel-5.3.8-21.ia64.rpm
Missing file
    MD5: 06ad3d2bfafc755705503205b3dc7685
ftp://updates.redhat.com/rhn/public/NULL/ImageMagick-perl/5.3.8-21/ia64/ImageMagick-perl-5.3.8-21.ia64.rpm
Missing file
    MD5: 793e001019fd9fbd61a0e0825502464c
 

Bugs fixed (see bugzilla for more information)

235071 - CVE-2007-1797 Heap overflow in ImageMagick's DCM and XWD coders
285861 - CVE-2008-1097 Memory corruption in ImageMagick's PCX coder
310091 - CVE-2007-4985 Infinite loops in ImageMagick's XCF and DCM coders
310121 - CVE-2007-4986 Multiple integer overflows in ImageMagick


References


Keywords

buffer, heap, integer, overflow, stack


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/