7.5
CWE
NVD-CWE-Other 119
Advisory Published
CVE Published
Updated

CVE-2004-0827: Buffer Overflow

First published: Thu Sep 16 2004(Updated: )

Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Enlightenment Imlib=1.9.8
Enlightenment Imlib2=1.1.1
Enlightenment Imlib=1.9.3
Enlightenment Imlib2=1.0
ImageMagick ImageMagick=5.4.3
Conectiva Linux=9.0
ImageMagick ImageMagick=6.0.2
Enlightenment Imlib=1.9.13
ImageMagick ImageMagick=5.4.8
Enlightenment Imlib=1.9.7
Enlightenment Imlib=1.9.1
Enlightenment Imlib2=1.0.5
ImageMagick ImageMagick=5.4.8.2.1.1.0
Enlightenment Imlib=1.9.10
Enlightenment Imlib=1.9.4
ImageMagick ImageMagick=5.5.3.2.1.2.0
ImageMagick ImageMagick=5.4.7
Enlightenment Imlib=1.9.2
Sun Java Desktop System=2003
Enlightenment Imlib2=1.0.2
ImageMagick ImageMagick=5.4.4.5
Enlightenment Imlib=1.9.11
ImageMagick ImageMagick=5.5.6.0_2003-04-09
Sun Java Desktop System=2.0
Enlightenment Imlib2=1.1
Enlightenment Imlib=1.9.12
Enlightenment Imlib=1.9.9
ImageMagick ImageMagick=5.3.3
Enlightenment Imlib2=1.0.3
Enlightenment Imlib2=1.0.4
Enlightenment Imlib=1.9.5
Enlightenment Imlib=1.9.6
Conectiva Linux=10.0
Enlightenment Imlib=1.9
Enlightenment Imlib=1.9.14
Enlightenment Imlib2=1.0.1
ImageMagick ImageMagick=5.5.7
Red Hat Enterprise Linux=2.1
Red Hat Fedora Core=core_2.0
Mandriva Linux Corporate Server=2.1
SUSE Linux=9.2
redhat enterprise Linux desktop=3.0
SUSE Linux=9.0
Ubuntu=4.1
Red Hat Linux Advanced Workstation=2.1
SUSE Linux=8.2
Red Hat Enterprise Linux=3.0
Red Hat Enterprise Linux=2.1
Mandrake Linux=9.2
Red Hat Enterprise Linux=2.1
Turbolinux=desktop_10.0
SUSE Linux=9.0
Red Hat Fedora Core=core_1.0
SUSE Linux=8.0
Mandrake Linux=9.2
Red Hat Linux Advanced Workstation=2.1
SUSE Linux=8.0
SUSE Linux=9.1
Turbolinux=workstation_7.0
Red Hat Enterprise Linux=3.0
Turbolinux=server_7.0
Red Hat Enterprise Linux=2.1
Turbolinux=server_8.0
Mandrake Linux=10.0
Red Hat Enterprise Linux=2.1
Red Hat Fedora Core=core_3.0
Ubuntu=4.1
Turbolinux=workstation_8.0
SUSE Linux=8.1
Red Hat Enterprise Linux=2.1
Mandriva Linux Corporate Server=2.1
Mandrake Linux=10.0
Red Hat Enterprise Linux=3.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2004-0827?

    CVE-2004-0827 is classified as a medium severity vulnerability due to the potential for denial of service and arbitrary code execution.

  • How do I fix CVE-2004-0827?

    To mitigate CVE-2004-0827, it is recommended to upgrade ImageMagick to version 6.0.6.2 or later and for Imlib and Imlib2, update to their respective latest versions.

  • What types of files can exploit CVE-2004-0827?

    CVE-2004-0827 can be exploited by malformed AVI, BMP, and DIB files.

  • What is the impact of CVE-2004-0827 on affected software?

    The impact of CVE-2004-0827 includes application crashes and potential remote code execution, leading to unauthorized control over the affected system.

  • Which software versions are affected by CVE-2004-0827?

    CVE-2004-0827 affects ImageMagick versions prior to 5.4.4 and 6.x before 6.0.6.2, along with specific versions of Enlightenment's Imlib and Imlib2.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203