First published: Sat Mar 26 2005(Updated: )
Heap-based buffer overflow in the SGI parser in ImageMagick before 6.0 allows remote attackers to execute arbitrary code via a crafted SGI image file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =5.3.8 | |
ImageMagick ImageMagick | =5.4.3 | |
ImageMagick ImageMagick | =6.0 | |
ImageMagick ImageMagick | =5.5.4 | |
ImageMagick ImageMagick | =5.4.8 | |
ImageMagick ImageMagick | =5.4.8.2.1.1.0 | |
ImageMagick ImageMagick | =6.0.1 | |
ImageMagick ImageMagick | =5.5.3.2.1.2.0 | |
ImageMagick ImageMagick | =5.4.7 | |
ImageMagick ImageMagick | =5.5.6 | |
ImageMagick ImageMagick | =5.4.4.5 | |
ImageMagick ImageMagick | =5.5.6.0_2003-04-09 | |
ImageMagick ImageMagick | =5.3.3 | |
ImageMagick ImageMagick | =5.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0762 is considered to have a high severity due to its potential for remote code execution.
To fix CVE-2005-0762, update ImageMagick to version 6.0.1 or later, which addresses the vulnerability.
CVE-2005-0762 affects ImageMagick versions 5.3.8, 5.4.3, 5.5.4, 5.4.8, and any 6.0 versions prior to the fixed release.
CVE-2005-0762 is a heap-based buffer overflow vulnerability occurring in the SGI parser.
Yes, CVE-2005-0762 can be exploited remotely through a crafted SGI image file.