Date: 20 January 2005
References: ESB-2005.0048
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2005.0058 -- Debian Security Advisory DSA 646-1
New ImageMagick packages fix arbitrary code execution
20 January 2005
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: imagemagick
Publisher: Debian
Operating System: Debian GNU/Linux 3.0
Linux variants
Impact: Execute Arbitrary Code/Commands
Access: Remote/Unauthenticated
CVE Names: CAN-2005-0005
Ref: ESB-2005.0048
Original Bulletin: http://www.debian.org/security/2005/dsa-646
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - --------------------------------------------------------------------------
Debian Security Advisory DSA 646-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 19th, 2005 http://www.debian.org/security/faq
- - --------------------------------------------------------------------------
Package : imagemagick
Vulnerability : buffer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-0005
Andrei Nigmatulin discovered a buffer overflow in the PSD
image-decoding module of ImageMagick, a commonly used image
manipulation library. Remote exploition with a carefully crafted
image could lead to the execution of arbitrary code.
For the stable distribution (woody) this problem has been fixed in
version 5.4.4.5-1woody5.
For the unstable distribution (sid) this problem has been fixed in
version 6.0.6.2-2.
We recommend that you upgrade your imagemagick packages.
Upgrade Instructions
- - --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5.dsc
Size/MD5 checksum: 852 7ca6886f64037e980060508a770bd777
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5.diff.gz
Size/MD5 checksum: 15619 4b8192231c8975e0f83bab0bdee0f25a
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5.orig.tar.gz
Size/MD5 checksum: 3901237 f35e356b4ac1ebc58e3cffa7ea7abc07
Alpha architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_alpha.deb
Size/MD5 checksum: 1309882 ddc9e1e57e1733ba68898c4d78d11ff2
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_alpha.deb
Size/MD5 checksum: 154212 c0cb6e3b81807a9ea8b6fcf1b3d3403e
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_alpha.deb
Size/MD5 checksum: 56326 883322541fe624e48bd4d2f579090d27
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_alpha.deb
Size/MD5 checksum: 833384 4a6b6198ca41453dd989e65f68d7d3be
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_alpha.deb
Size/MD5 checksum: 67370 a7487a31ee8afcf6e8dbc942d9eb7226
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_alpha.deb
Size/MD5 checksum: 113864 815d027cfec793000bb6eafd54b6c6d4
ARM architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_arm.deb
Size/MD5 checksum: 1297154 08cf4503548d7b4f594b19dbbbc9b620
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_arm.deb
Size/MD5 checksum: 118778 7ea1c8496ba2f9b10e173136d7646b19
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_arm.deb
Size/MD5 checksum: 56372 5b58a6cfa9f0585b7dbcb2a6a079f5bb
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_arm.deb
Size/MD5 checksum: 898716 4cbae243299cab78d9c7189d57b5f5e5
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_arm.deb
Size/MD5 checksum: 67398 9f7051f05c9f6339f29c814e6800c5a8
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_arm.deb
Size/MD5 checksum: 109992 feded00d7fa37064e447fd140a06b861
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_i386.deb
Size/MD5 checksum: 1295194 4c860486ff0284c0f3a02e6db73d2729
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_i386.deb
Size/MD5 checksum: 122838 1fa97dc730589c4d2405cfb1daf65d58
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_i386.deb
Size/MD5 checksum: 56348 f6f1831bc53050fed4be4a779f617d85
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_i386.deb
Size/MD5 checksum: 772594 bc095d6fc212c57e76682d2e908e645f
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_i386.deb
Size/MD5 checksum: 67380 77bbc19b74af8f4ec6a423ca2cb8519f
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_i386.deb
Size/MD5 checksum: 106994 893011a405b1e248c75f9c2e2e43cdf6
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_ia64.deb
Size/MD5 checksum: 1336218 0da64c0ceb2ae9c2841ce4686c81ebbf
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_ia64.deb
Size/MD5 checksum: 137108 a2353ec66b50f90e3738aedde81e5093
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_ia64.deb
Size/MD5 checksum: 56312 044edaa6a7185e0e26a98a90748f1a7b
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_ia64.deb
Size/MD5 checksum: 1360062 471ec0c40753bb7eac7e45385b0c96f0
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_ia64.deb
Size/MD5 checksum: 67354 17efc0247ef95e3c38d170ed2f61a743
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_ia64.deb
Size/MD5 checksum: 132964 bacf380322370e7ced619ca4c76388f0
HP Precision architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_hppa.deb
Size/MD5 checksum: 1297430 d70abbbe6d475d60fc2a34e2778c12f2
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_hppa.deb
Size/MD5 checksum: 132930 fedc55e4a005b28e00b54c993887e209
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_hppa.deb
Size/MD5 checksum: 56362 8ec84f2f0a57a4c7f4289a652a4528ba
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_hppa.deb
Size/MD5 checksum: 859932 43a200eb3b9a70b8de1227e99820fb01
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_hppa.deb
Size/MD5 checksum: 67394 b1d4e146818947a44af16f15a1451a18
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_hppa.deb
Size/MD5 checksum: 117242 fc089bd83662c0fcc49cc0b569bb1c30
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_m68k.deb
Size/MD5 checksum: 1292622 a87e2eb868de28f78bf59d001468aedb
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_m68k.deb
Size/MD5 checksum: 134082 9ea7de99c48a5dc768fa8224aa0238d5
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_m68k.deb
Size/MD5 checksum: 56392 c2059fc2455faa9c1d0a2f6f95fe5ba7
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_m68k.deb
Size/MD5 checksum: 751912 e80a1f4e2544d275fda1551b57d0246a
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_m68k.deb
Size/MD5 checksum: 67420 db7a3156415f665889b025a154e2e9f5
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_m68k.deb
Size/MD5 checksum: 107482 54a1926ff755f825afa4b89efbadfd76
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_mips.deb
Size/MD5 checksum: 1294936 67ca29a49ab0c8e515e4810ece9ab409
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_mips.deb
Size/MD5 checksum: 120352 99578089369ea2a003d0a56aec6d34b2
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_mips.deb
Size/MD5 checksum: 56362 98ecbc125c9451d9e885bb325997a73b
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_mips.deb
Size/MD5 checksum: 733120 641218d8281d38b3b55fb6d787e68760
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_mips.deb
Size/MD5 checksum: 67404 3d0714b089cd5de5e4471aaf760a831e
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_mips.deb
Size/MD5 checksum: 103404 1517f93c042c60907d9bcc98ab7a70c8
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_mipsel.deb
Size/MD5 checksum: 1294920 a4ecbf6a8abbd0e18e0b3c2d896e2dcc
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_mipsel.deb
Size/MD5 checksum: 113950 5cfad22c7d0beec13255e148ca11783d
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_mipsel.deb
Size/MD5 checksum: 56390 599616ef7a5869f65f65d4e1a493160c
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_mipsel.deb
Size/MD5 checksum: 721098 084defe73c73603e61b69419e1374f8e
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_mipsel.deb
Size/MD5 checksum: 67414 1e8aa5e91cf61883a0c046f2d734c12c
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_mipsel.deb
Size/MD5 checksum: 102940 78c33b91bf9214e4caaa39eaf0679df7
PowerPC architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_powerpc.deb
Size/MD5 checksum: 1291544 7b362ea5200d9f6e9d2721cd94f2c0d0
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_powerpc.deb
Size/MD5 checksum: 135970 01a05f7cd212b3fa7ed76c0a0525c7b3
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_powerpc.deb
Size/MD5 checksum: 56354 07ec4a9182761c19fd19090d0fdcaa04
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_powerpc.deb
Size/MD5 checksum: 786292 5415dfec8fbed3256fd306a727408d15
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_powerpc.deb
Size/MD5 checksum: 67400 644db38acce431e9b42baf87691232d7
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_powerpc.deb
Size/MD5 checksum: 111994 9723784a9a5d0da539449356f2437dbb
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_s390.deb
Size/MD5 checksum: 1292246 2f71ab873e1756bd046a2321835a94b4
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_s390.deb
Size/MD5 checksum: 132088 7d757d128832809a4d151013bb5cd488
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_s390.deb
Size/MD5 checksum: 56364 375a050c6067239cdc4bbf6effca8132
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_s390.deb
Size/MD5 checksum: 778100 e5185091f6cd9e27d71580fb38fc8690
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_s390.deb
Size/MD5 checksum: 67390 26dc5601e55ead50a24df92aa115e44e
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_s390.deb
Size/MD5 checksum: 109050 4c65dcbf5625457c3fe1aa91f6664045
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_5.4.4.5-1woody5_sparc.deb
Size/MD5 checksum: 1295258 21cd0e05b94c92089329dd5668835e0d
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5_5.4.4.5-1woody5_sparc.deb
Size/MD5 checksum: 123926 2555c9f3c2b04fb3158ba1013b66f2f2
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++5-dev_5.4.4.5-1woody5_sparc.deb
Size/MD5 checksum: 56360 0d0cbbb1bd4c1ba9ab5a843097f5d194
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5_5.4.4.5-1woody5_sparc.deb
Size/MD5 checksum: 802740 5636ffd8e41544e1495668221c448cdf
http://security.debian.org/pool/updates/main/i/imagemagick/libmagick5-dev_5.4.4.5-1woody5_sparc.deb
Size/MD5 checksum: 67386 165565fb0f4519388893f2f8548b0535
http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_5.4.4.5-1woody5_sparc.deb
Size/MD5 checksum: 112954 c7a6faee63c2c8b59a30585245e4c2a1
These files will probably be moved into the stable distribution on
its next update.
- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFB7jYAW5ql+IAeqTIRAtNOAKCZNtyHJpad346WmRf70kLRINfmYgCgiCtV
IXiHbqnqaEW7TwycUX+pXiY=
=a5Dv
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQe77mih9+71yA2DNAQJToAQAjGq7ATvcRAtSRLjuaAv3mvavlfYuqJ6w
+XM9h+CV5v+5Sm3rFi9DaN1D4TlRG1OJaWmxVws6a+b6+2sL/slcx/BYOOwnNxNM
sEaC5qWppW1cwwI7dmKX2ovkEg2IKejrCxy1e8VHzRoJCuW0i8vQIgL5QvZAH0xF
6wSgrS+K03A=
=/+YO
-----END PGP SIGNATURE-----
|