CVE-2006-5456

Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
http://secunia.com/advisories/22569 Vendor Advisory
http://secunia.com/advisories/22572 Vendor Advisory
http://secunia.com/advisories/22601 Vendor Advisory
http://secunia.com/advisories/22604 Vendor Advisory
http://secunia.com/advisories/22819 Vendor Advisory
http://secunia.com/advisories/22834 Vendor Advisory
http://secunia.com/advisories/22998 Vendor Advisory
http://secunia.com/advisories/23090 Vendor Advisory
http://secunia.com/advisories/23121 Vendor Advisory
http://secunia.com/advisories/24186 Vendor Advisory
http://secunia.com/advisories/24196 Vendor Advisory
http://secunia.com/advisories/24284 Vendor Advisory
http://secunia.com/advisories/24458 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-07.xml
http://security.gentoo.org/glsa/glsa-200611-19.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092
http://www.debian.org/security/2006/dsa-1213
http://www.mandriva.com/security/advisories?name=MDKSA-2006:193
http://www.mandriva.com/security/advisories?name=MDKSA-2007:041
http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html
http://www.novell.com/linux/security/advisories/2007_3_sr.html
http://www.osvdb.org/29990
http://www.redhat.com/support/errata/RHSA-2007-0015.html Vendor Advisory
http://www.securityfocus.com/archive/1/452718/100/100/threaded
http://www.securityfocus.com/archive/1/459507/100/0/threaded
http://www.securityfocus.com/bid/20707
http://www.ubuntu.com/usn/usn-372-1
http://www.ubuntu.com/usn/usn-422-1
http://www.vupen.com/english/advisories/2006/4170 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4171 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/29816
https://issues.rpath.com/browse/RPL-1034
https://issues.rpath.com/browse/RPL-811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
http://secunia.com/advisories/22569 Vendor Advisory
http://secunia.com/advisories/22572 Vendor Advisory
http://secunia.com/advisories/22601 Vendor Advisory
http://secunia.com/advisories/22604 Vendor Advisory
http://secunia.com/advisories/22819 Vendor Advisory
http://secunia.com/advisories/22834 Vendor Advisory
http://secunia.com/advisories/22998 Vendor Advisory
http://secunia.com/advisories/23090 Vendor Advisory
http://secunia.com/advisories/23121 Vendor Advisory
http://secunia.com/advisories/24186 Vendor Advisory
http://secunia.com/advisories/24196 Vendor Advisory
http://secunia.com/advisories/24284 Vendor Advisory
http://secunia.com/advisories/24458 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-07.xml
http://security.gentoo.org/glsa/glsa-200611-19.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092
http://www.debian.org/security/2006/dsa-1213
http://www.mandriva.com/security/advisories?name=MDKSA-2006:193
http://www.mandriva.com/security/advisories?name=MDKSA-2007:041
http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html
http://www.novell.com/linux/security/advisories/2007_3_sr.html
http://www.osvdb.org/29990
http://www.redhat.com/support/errata/RHSA-2007-0015.html Vendor Advisory
http://www.securityfocus.com/archive/1/452718/100/100/threaded
http://www.securityfocus.com/archive/1/459507/100/0/threaded
http://www.securityfocus.com/bid/20707
http://www.ubuntu.com/usn/usn-372-1
http://www.ubuntu.com/usn/usn-422-1
http://www.vupen.com/english/advisories/2006/4170 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4171 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/29816
https://issues.rpath.com/browse/RPL-1034
https://issues.rpath.com/browse/RPL-811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:19

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc - () ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc -
References () http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9 - () http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9 -
References () http://secunia.com/advisories/22569 - Vendor Advisory () http://secunia.com/advisories/22569 - Vendor Advisory
References () http://secunia.com/advisories/22572 - Vendor Advisory () http://secunia.com/advisories/22572 - Vendor Advisory
References () http://secunia.com/advisories/22601 - Vendor Advisory () http://secunia.com/advisories/22601 - Vendor Advisory
References () http://secunia.com/advisories/22604 - Vendor Advisory () http://secunia.com/advisories/22604 - Vendor Advisory
References () http://secunia.com/advisories/22819 - Vendor Advisory () http://secunia.com/advisories/22819 - Vendor Advisory
References () http://secunia.com/advisories/22834 - Vendor Advisory () http://secunia.com/advisories/22834 - Vendor Advisory
References () http://secunia.com/advisories/22998 - Vendor Advisory () http://secunia.com/advisories/22998 - Vendor Advisory
References () http://secunia.com/advisories/23090 - Vendor Advisory () http://secunia.com/advisories/23090 - Vendor Advisory
References () http://secunia.com/advisories/23121 - Vendor Advisory () http://secunia.com/advisories/23121 - Vendor Advisory
References () http://secunia.com/advisories/24186 - Vendor Advisory () http://secunia.com/advisories/24186 - Vendor Advisory
References () http://secunia.com/advisories/24196 - Vendor Advisory () http://secunia.com/advisories/24196 - Vendor Advisory
References () http://secunia.com/advisories/24284 - Vendor Advisory () http://secunia.com/advisories/24284 - Vendor Advisory
References () http://secunia.com/advisories/24458 - Vendor Advisory () http://secunia.com/advisories/24458 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200611-07.xml - () http://security.gentoo.org/glsa/glsa-200611-07.xml -
References () http://security.gentoo.org/glsa/glsa-200611-19.xml - () http://security.gentoo.org/glsa/glsa-200611-19.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092 -
References () http://www.debian.org/security/2006/dsa-1213 - () http://www.debian.org/security/2006/dsa-1213 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:193 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:193 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:041 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:041 -
References () http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html - () http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html -
References () http://www.novell.com/linux/security/advisories/2007_3_sr.html - () http://www.novell.com/linux/security/advisories/2007_3_sr.html -
References () http://www.osvdb.org/29990 - () http://www.osvdb.org/29990 -
References () http://www.redhat.com/support/errata/RHSA-2007-0015.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2007-0015.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/452718/100/100/threaded - () http://www.securityfocus.com/archive/1/452718/100/100/threaded -
References () http://www.securityfocus.com/archive/1/459507/100/0/threaded - () http://www.securityfocus.com/archive/1/459507/100/0/threaded -
References () http://www.securityfocus.com/bid/20707 - () http://www.securityfocus.com/bid/20707 -
References () http://www.ubuntu.com/usn/usn-372-1 - () http://www.ubuntu.com/usn/usn-372-1 -
References () http://www.ubuntu.com/usn/usn-422-1 - () http://www.ubuntu.com/usn/usn-422-1 -
References () http://www.vupen.com/english/advisories/2006/4170 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4170 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/4171 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4171 - Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921 - Patch () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29816 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29816 -
References () https://issues.rpath.com/browse/RPL-1034 - () https://issues.rpath.com/browse/RPL-1034 -
References () https://issues.rpath.com/browse/RPL-811 - () https://issues.rpath.com/browse/RPL-811 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765 -

Information

Published : 2006-10-23 17:07

Updated : 2024-11-21 00:19


NVD link : CVE-2006-5456

Mitre link : CVE-2006-5456

CVE.ORG link : CVE-2006-5456


JSON object : View

Products Affected

imagemagick

  • imagemagick

graphicsmagick

  • graphicsmagick
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer