Linux Security
    Linux Security
    Linux Security

    Debian: imagemagick: Insecure temporary file

    Posted By
    Thisvulnerability could be exploited by a local user to create oroverwrite files with the privileges of another user who is invoking a program using this library.
    Debian Security Advisory DSA 331-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    June 27th, 2003                 
    Package        : imagemagick
    Vulnerability  : insecure temporary file
    Problem-Type   : local
    Debian-specific: no
    CVE Ids        : CAN-2003-0455
    imagemagick's libmagick library, under certain circumstances, creates
    temporary files without taking appropriate security precautions.  This
    vulnerability could be exploited by a local user to create or
    overwrite files with the privileges of another user who is invoking a
    program using this library.
    For the stable distribution (woody) this problem has been fixed in
    version 4:
    For the unstable distribution (sid) this problem has been fixed in
    version 4:5.5.7-1.
    We recommend that you update your imagemagick package.
    Upgrade Instructions
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
      Source archives:
          Size/MD5 checksum:      852 d5287cb8bb5ebea7feb163dce7eb8745
          Size/MD5 checksum:    13713 97639f0bf3a5b64cdb64be4cad800b22
          Size/MD5 checksum:  3901237 f35e356b4ac1ebc58e3cffa7ea7abc07
      Alpha architecture:
          Size/MD5 checksum:  1309154 d10139392bc5d82619c80c91e9877e78
          Size/MD5 checksum:   153872 54e5bef7b11b49db821d848dd1cdb46b
          Size/MD5 checksum:    55832 04c80b948497f84d9a8986a9129e0a1a
          Size/MD5 checksum:   831150 02277cf6f610d47bc6b407891206a75c
          Size/MD5 checksum:    66896 33e498a7e3feb84ae35c1fd8dcd6435e
          Size/MD5 checksum:   113414 4bf9c2bbdd47c137c92e86f8e778c623
      ARM architecture:
          Size/MD5 checksum:  1296660 9e0819548f01c7423730043c37283fec
          Size/MD5 checksum:   118278 e1b9d0198d61f6eb354f61f508d50220
          Size/MD5 checksum:    55870 9193725a617bd076e34678e8dc7870bb
          Size/MD5 checksum:   896558 2fbd372591d2b262c506ccdf6279dc13
          Size/MD5 checksum:    66928 54c4c1a1ea835fb28fc2bfdfac6fdd5c
          Size/MD5 checksum:   109542 241c0e1f3aa2014479591e7c90cc3e3e
      Intel IA-32 architecture:
          Size/MD5 checksum:  1294636 6ebfed48af04904c53cb3b167d35f8c9
          Size/MD5 checksum:   122406 a2a44e6b90b4661cbdce947dbb5cea6d
          Size/MD5 checksum:    55866 73beac80a24ce0f7ad7a8b00c3d23360
          Size/MD5 checksum:   769968 0999159912077ffa4e6e9b1a813d06f9
          Size/MD5 checksum:    66918 68190ab0bd2c82b347e250c39580e810
          Size/MD5 checksum:   106550 da18e85a4ab5120c0e6a14a900628ce5
      Intel IA-64 architecture:
          Size/MD5 checksum:  1335610 9836eb7439f6b806a4c06f314922d03a
          Size/MD5 checksum:   136736 3b5d3b07566eebebed117e27d6c70880
          Size/MD5 checksum:    55826 7b1ae8505a7b66b917a705abddbb8337
          Size/MD5 checksum:  1354912 9f7cb7031b17c60110b6b807c4976c65
          Size/MD5 checksum:    66888 915675cc1be6c2ec1aa1c2317f287ab0
          Size/MD5 checksum:   132546 8e91d9b19ea31dfc5ab8082bf4d424c2
      HP Precision architecture:
          Size/MD5 checksum:  1296918 8ecf64e7738980aa040e5e03a2ee640b
          Size/MD5 checksum:   132462 8cf94dbb086206f9ee00fe777f550357
          Size/MD5 checksum:    55864 d2bc8567aa8d2d412a16d7d123c9eb11
          Size/MD5 checksum:   857142 4effa98d340a4adc3e01e08693f0f9c0
          Size/MD5 checksum:    66920 4235b8e124f8872d4aa0716031ba16e0
          Size/MD5 checksum:   116788 0ad5543d824d37dd507e496816a6a996
      Motorola 680x0 architecture:
          Size/MD5 checksum:  1291910 0f79f1b5c834119c55cafdf370b6dd2e
          Size/MD5 checksum:   133604 6b949f8416e73e015ce3e8c55eb88871
          Size/MD5 checksum:    55880 ff697d65ba7893023f69334b3aa14dec
          Size/MD5 checksum:   750226 7760eeacbf881fd994e37c2bc824f8c0
          Size/MD5 checksum:    66958 2cbf7b99d2da0b88994776aa91552e20
          Size/MD5 checksum:   107050 5a895603cb4a0e48e7271a302cad7cee
      Big endian MIPS architecture:
          Size/MD5 checksum:  1294384 4fe7c423a428d9879590b0a15debfd24
          Size/MD5 checksum:   119758 5c13b74e3fbb360822a23dce0c739bca
          Size/MD5 checksum:    55882 671f295f4f2f98e998c8a8c0bd70ccbb
          Size/MD5 checksum:   730286 f091d817357ec3c6a0c4c1e4d4f80b7b
          Size/MD5 checksum:    66932 139499cceccb1a43665a8fa7e451774e
          Size/MD5 checksum:   102960 2c9659cc2cb80059344a5daf30042c81
      Little endian MIPS architecture:
          Size/MD5 checksum:  1294254 56f9a24d4ca3f5085c4764fff7e26643
          Size/MD5 checksum:   113250 347dd47ba9f259320fbd9694c59f7643
          Size/MD5 checksum:    55870 85567e1aae400036fc37be9c58d18ec4
          Size/MD5 checksum:   718640 79af8a4685086c782b0b55aff35c7e01
          Size/MD5 checksum:    66934 be08669429d5efc1f6a408b0d5cc9aec
          Size/MD5 checksum:   102492 758c8d725f91c2b966cbe648315b1982
      PowerPC architecture:
          Size/MD5 checksum:  1290880 e56a6fcbc1b06d63f0d8624a6c14ff55
          Size/MD5 checksum:   135542 637e7a4decebc592c4392c5d28fedcfb
          Size/MD5 checksum:    55868 7adc59ccb76521f5f257cf2a400b9fcc
          Size/MD5 checksum:   783718 b15259a4f6352b42adc1f2ceeff4c3b2
          Size/MD5 checksum:    66920 87b669690d7d5cc503e94d159936cafb
          Size/MD5 checksum:   111546 8ce272013a9dc7a7d1ba21bde37224ed
      IBM S/390 architecture:
          Size/MD5 checksum:  1291660 5eb4312df52449e33801d22fe79ae8b9
          Size/MD5 checksum:   131618 138ec629de5947a631d96e36fdd20925
          Size/MD5 checksum:    55858 e01a9940a1c4013ef863e5824b62775b
          Size/MD5 checksum:   775122 c24c8778527e89485f8c1615a90b2cc0
          Size/MD5 checksum:    66910 278a7bc2cfa9c0df57583906f60a23e5
          Size/MD5 checksum:   108586 3a65d9b73cf2894b21263fd11b1ca598
      Sun Sparc architecture:
          Size/MD5 checksum:  1294684 7b6da4b91f91e09fea287d613548c870
          Size/MD5 checksum:   123462 4be81cc71d4da063f45ef86bf1e8c0be
          Size/MD5 checksum:    55856 693ab80759b91751f1d39a42297428d3
          Size/MD5 checksum:   800230 6c36c10ef707cb6783fae7999b8f8786
          Size/MD5 checksum:    66926 95b5886aef2a301c2bb4aecffbb7c116
          Size/MD5 checksum:   112502 72c181c78fa4b8b63f635612870e78ef
      These files will probably be moved into the stable distribution on
      its next revision.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    Tails is the most secure Linux distro out there.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"142","title":"Yes - Tails get my vote!","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"143","title":"Nope - Parrot OS has surpassed Tails in its security and privacy.","votes":"0","type":"x","order":"2","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.