Heap-based buffer overflow in the libMagick component of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9481 | signature vdb entry |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345595 | patch |
http://www.debian.org/security/2006/dsa-1168 | vendor advisory |
http://secunia.com/advisories/24284 | third party advisory |
http://secunia.com/advisories/21719 | third party advisory |
http://www.redhat.com/support/errata/RHSA-2007-0015.html | vendor advisory |
http://secunia.com/advisories/24186 | third party advisory |
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc | vendor advisory |