Vulnerabilities in Image Magick Closed

Sep 24, 2007

Four bugs have been discovered in the free Image Magick image manipulation Software and classified as highly critical by several security research services. A new version closes the security holes.

Version 6.3.5-9 of Image Magick, which was released recently, removes four vulnerabilities. Applications that used libraries provided by the software were also affected. One vulnerability allowed denial of service attacks that resulted in increased CPU activity and considerably slowed down the compromised system.

Potential attackers were able to exploit an error in the "AllocateImageColormap()", "ReadDCMImage()", "ReadDIBImage()", and "ReadXBMImage()" functions to crash Image Magick and other applications by triggering an integer overflow. An "off-by-one"error in the "ReadBlobString()" function and various errors in the "ReadDCMImage()" and "ReadXCFImage()" functions gave successful attackers the ability to run arbitrary code.

The security holes not only affect Linux systems, but any platform for which Image Magick is available. The developers advise users to upgrade to the new version as soon as possible. The sources for version 6.3.5-9 are available from various mirrors. Prebuilt packages are available here for Linux, Unix, Mac OS X and Windows.

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More