Heap-based buffer overflow in the libMagick component of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc - | |
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345595 - Patch | |
References | () http://secunia.com/advisories/21719 - | |
References | () http://secunia.com/advisories/24186 - | |
References | () http://secunia.com/advisories/24284 - | |
References | () http://www.debian.org/security/2006/dsa-1168 - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0015.html - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9481 - |
Information
Published : 2006-05-18 10:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2440
Mitre link : CVE-2006-2440
CVE.ORG link : CVE-2006-2440
JSON object : View
Products Affected
imagemagick
- imagemagick
CWE