First published: Fri Nov 19 2004(Updated: )
Buffer overflow in the EXIF parsing routine in ImageMagick before 6.1.0 allows remote attackers to execute arbitrary code via a certain image file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =5.4.3 | |
ImageMagick ImageMagick | =6.0.8 | |
ImageMagick ImageMagick | =6.0.3 | |
ImageMagick ImageMagick | =6.0 | |
ImageMagick ImageMagick | =5.4.8 | |
ImageMagick ImageMagick | =5.4.8.2.1.1.0 | |
ImageMagick ImageMagick | =6.0.7 | |
ImageMagick ImageMagick | =6.0.1 | |
ImageMagick ImageMagick | =5.5.3.2.1.2.0 | |
ImageMagick ImageMagick | =5.4.7 | |
ImageMagick ImageMagick | =5.4.4.5 | |
ImageMagick ImageMagick | =5.5.6.0_2003-04-09 | |
ImageMagick ImageMagick | =6.0.4 | |
ImageMagick ImageMagick | =6.0.5 | |
ImageMagick ImageMagick | =5.3.3 | |
ImageMagick ImageMagick | =6.0.6 | |
ImageMagick ImageMagick | =5.5.7 | |
Suse Suse Linux | =9.2 | |
Debian Debian Linux | =3.0 | |
Suse Suse Linux | =9.0 | |
Debian Debian Linux | =3.0 | |
Suse Suse Linux | =8.2 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Suse Suse Linux | =9.0 | |
Debian Debian Linux | =3.0 | |
Suse Suse Linux | =8.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Suse Suse Linux | =9.1 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Gentoo Linux | ||
Debian Debian Linux | =3.0 | |
Suse Suse Linux | =8.1 | |
ubuntu/graphicsmagick | <1.1.7-8 | 1.1.7-8 |
ubuntu/graphicsmagick | <1.1.7-8 | 1.1.7-8 |
ubuntu/imagemagick | <6.2.4.5-0.6ubuntu0.6 | 6.2.4.5-0.6ubuntu0.6 |
ubuntu/imagemagick | <6.2.4.5.dfsg1-0.10ubuntu0.3 | 6.2.4.5.dfsg1-0.10ubuntu0.3 |
ubuntu/imagemagick | <6.2.4.5.dfsg1-0.14ubuntu0.1 | 6.2.4.5.dfsg1-0.14ubuntu0.1 |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.43-1 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u1 8:6.9.13.12+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.