- --------------------------------------------------------------------------Debian Security Advisory DSA 646-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
January 19th, 2005                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : imagemagick
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-0005

Andrei Nigmatulin discovered a buffer overflow in the PSD
image-decoding module of ImageMagick, a commonly used image
manipulation library.  Remote exploition with a carefully crafted
image could lead to the execution of arbitrary code.

For the stable distribution (woody) this problem has been fixed in
version 5.4.4.5-1woody5.

For the unstable distribution (sid) this problem has been fixed in
version 6.0.6.2-2.

We recommend that you upgrade your imagemagick packages.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------  Source archives:

          Size/MD5 checksum:      852 7ca6886f64037e980060508a770bd777
          Size/MD5 checksum:    15619 4b8192231c8975e0f83bab0bdee0f25a
          Size/MD5 checksum:  3901237 f35e356b4ac1ebc58e3cffa7ea7abc07

  Alpha architecture:

          Size/MD5 checksum:  1309882 ddc9e1e57e1733ba68898c4d78d11ff2
          Size/MD5 checksum:   154212 c0cb6e3b81807a9ea8b6fcf1b3d3403e
          Size/MD5 checksum:    56326 883322541fe624e48bd4d2f579090d27
          Size/MD5 checksum:   833384 4a6b6198ca41453dd989e65f68d7d3be
          Size/MD5 checksum:    67370 a7487a31ee8afcf6e8dbc942d9eb7226
          Size/MD5 checksum:   113864 815d027cfec793000bb6eafd54b6c6d4

  ARM architecture:

          Size/MD5 checksum:  1297154 08cf4503548d7b4f594b19dbbbc9b620
          Size/MD5 checksum:   118778 7ea1c8496ba2f9b10e173136d7646b19
          Size/MD5 checksum:    56372 5b58a6cfa9f0585b7dbcb2a6a079f5bb
          Size/MD5 checksum:   898716 4cbae243299cab78d9c7189d57b5f5e5
          Size/MD5 checksum:    67398 9f7051f05c9f6339f29c814e6800c5a8
          Size/MD5 checksum:   109992 feded00d7fa37064e447fd140a06b861

  Intel IA-32 architecture:

          Size/MD5 checksum:  1295194 4c860486ff0284c0f3a02e6db73d2729
          Size/MD5 checksum:   122838 1fa97dc730589c4d2405cfb1daf65d58
          Size/MD5 checksum:    56348 f6f1831bc53050fed4be4a779f617d85
          Size/MD5 checksum:   772594 bc095d6fc212c57e76682d2e908e645f
          Size/MD5 checksum:    67380 77bbc19b74af8f4ec6a423ca2cb8519f
          Size/MD5 checksum:   106994 893011a405b1e248c75f9c2e2e43cdf6

  Intel IA-64 architecture:

          Size/MD5 checksum:  1336218 0da64c0ceb2ae9c2841ce4686c81ebbf
          Size/MD5 checksum:   137108 a2353ec66b50f90e3738aedde81e5093
          Size/MD5 checksum:    56312 044edaa6a7185e0e26a98a90748f1a7b
          Size/MD5 checksum:  1360062 471ec0c40753bb7eac7e45385b0c96f0
          Size/MD5 checksum:    67354 17efc0247ef95e3c38d170ed2f61a743
          Size/MD5 checksum:   132964 bacf380322370e7ced619ca4c76388f0

  HP Precision architecture:

          Size/MD5 checksum:  1297430 d70abbbe6d475d60fc2a34e2778c12f2
          Size/MD5 checksum:   132930 fedc55e4a005b28e00b54c993887e209
          Size/MD5 checksum:    56362 8ec84f2f0a57a4c7f4289a652a4528ba
          Size/MD5 checksum:   859932 43a200eb3b9a70b8de1227e99820fb01
          Size/MD5 checksum:    67394 b1d4e146818947a44af16f15a1451a18
          Size/MD5 checksum:   117242 fc089bd83662c0fcc49cc0b569bb1c30

  Motorola 680x0 architecture:

          Size/MD5 checksum:  1292622 a87e2eb868de28f78bf59d001468aedb
          Size/MD5 checksum:   134082 9ea7de99c48a5dc768fa8224aa0238d5
          Size/MD5 checksum:    56392 c2059fc2455faa9c1d0a2f6f95fe5ba7
          Size/MD5 checksum:   751912 e80a1f4e2544d275fda1551b57d0246a
          Size/MD5 checksum:    67420 db7a3156415f665889b025a154e2e9f5
          Size/MD5 checksum:   107482 54a1926ff755f825afa4b89efbadfd76

  Big endian MIPS architecture:

          Size/MD5 checksum:  1294936 67ca29a49ab0c8e515e4810ece9ab409
          Size/MD5 checksum:   120352 99578089369ea2a003d0a56aec6d34b2
          Size/MD5 checksum:    56362 98ecbc125c9451d9e885bb325997a73b
          Size/MD5 checksum:   733120 641218d8281d38b3b55fb6d787e68760
          Size/MD5 checksum:    67404 3d0714b089cd5de5e4471aaf760a831e
          Size/MD5 checksum:   103404 1517f93c042c60907d9bcc98ab7a70c8

  Little endian MIPS architecture:

          Size/MD5 checksum:  1294920 a4ecbf6a8abbd0e18e0b3c2d896e2dcc
          Size/MD5 checksum:   113950 5cfad22c7d0beec13255e148ca11783d
          Size/MD5 checksum:    56390 599616ef7a5869f65f65d4e1a493160c
          Size/MD5 checksum:   721098 084defe73c73603e61b69419e1374f8e
          Size/MD5 checksum:    67414 1e8aa5e91cf61883a0c046f2d734c12c
          Size/MD5 checksum:   102940 78c33b91bf9214e4caaa39eaf0679df7

  PowerPC architecture:

          Size/MD5 checksum:  1291544 7b362ea5200d9f6e9d2721cd94f2c0d0
          Size/MD5 checksum:   135970 01a05f7cd212b3fa7ed76c0a0525c7b3
          Size/MD5 checksum:    56354 07ec4a9182761c19fd19090d0fdcaa04
          Size/MD5 checksum:   786292 5415dfec8fbed3256fd306a727408d15
          Size/MD5 checksum:    67400 644db38acce431e9b42baf87691232d7
          Size/MD5 checksum:   111994 9723784a9a5d0da539449356f2437dbb

  IBM S/390 architecture:

          Size/MD5 checksum:  1292246 2f71ab873e1756bd046a2321835a94b4
          Size/MD5 checksum:   132088 7d757d128832809a4d151013bb5cd488
          Size/MD5 checksum:    56364 375a050c6067239cdc4bbf6effca8132
          Size/MD5 checksum:   778100 e5185091f6cd9e27d71580fb38fc8690
          Size/MD5 checksum:    67390 26dc5601e55ead50a24df92aa115e44e
          Size/MD5 checksum:   109050 4c65dcbf5625457c3fe1aa91f6664045

  Sun Sparc architecture:

          Size/MD5 checksum:  1295258 21cd0e05b94c92089329dd5668835e0d
          Size/MD5 checksum:   123926 2555c9f3c2b04fb3158ba1013b66f2f2
          Size/MD5 checksum:    56360 0d0cbbb1bd4c1ba9ab5a843097f5d194
          Size/MD5 checksum:   802740 5636ffd8e41544e1495668221c448cdf
          Size/MD5 checksum:    67386 165565fb0f4519388893f2f8548b0535
          Size/MD5 checksum:   112954 c7a6faee63c2c8b59a30585245e4c2a1


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: ImageMagick fix arbitrary code execution DSA-646-1

January 19, 2005
Andrei Nigmatulin discovered a buffer overflow in the PSD image-decoding module of ImageMagick, a commonly used image manipulation library

Summary

Severity

Related News