National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2006-5456 Detail

Current Description

Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.

Source:  MITRE      Last Modified:  10/23/2006      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2006-5456
Original release date:
10/23/2006
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.1 MEDIUM
Vector:
(AV:N/AC:H/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
4.9
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
High
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Evaluator Solution

This vulnerability is addressed in the following product release: GraphicsMagick, GraphicsMagick, 1.1.7 Unable to identify a patch for ImageMagick.

Vendor Statements (disclaimer)

Official Statement from Red Hat (03/14/2007)

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc External Source SGI 20070201-01-P
http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9 External Source CONFIRM http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
http://security.gentoo.org/glsa/glsa-200611-07.xml External Source GENTOO GLSA-200611-07
http://security.gentoo.org/glsa/glsa-200611-19.xml External Source GENTOO GLSA-200611-19
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092 External Source SLACKWARE SSA:2007-066-06
http://www.debian.org/security/2006/dsa-1213 External Source DEBIAN DSA-1213
http://www.mandriva.com/security/advisories?name=MDKSA-2006:193 External Source MANDRIVA MDKSA-2006:193
http://www.mandriva.com/security/advisories?name=MDKSA-2007:041 External Source MANDRIVA MDKSA-2007:041
http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html External Source SUSE SUSE-SA:2006:066
http://www.novell.com/linux/security/advisories/2007_3_sr.html External Source SUSE SUSE-SR:2007:003
http://www.redhat.com/support/errata/RHSA-2007-0015.html Vendor Advisory External Source REDHAT RHSA-2007:0015
http://www.securityfocus.com/archive/1/archive/1/452718/100/100/threaded External Source BUGTRAQ 20061127 rPSA-2006-0218-1 ImageMagick
http://www.securityfocus.com/archive/1/archive/1/459507/100/0/threaded External Source BUGTRAQ 20070208 rPSA-2007-0029-1 ImageMagick
http://www.securityfocus.com/bid/20707 External Source BID 20707
http://www.ubuntu.com/usn/usn-372-1 External Source UBUNTU USN-372-1
http://www.ubuntu.com/usn/usn-422-1 External Source UBUNTU USN-422-1
http://www.vupen.com/english/advisories/2006/4170 Vendor Advisory External Source VUPEN ADV-2006-4170
http://www.vupen.com/english/advisories/2006/4171 Vendor Advisory External Source VUPEN ADV-2006-4171
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921 Patch External Source CONFIRM https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921
https://exchange.xforce.ibmcloud.com/vulnerabilities/29816 External Source XF imagemagick-graphicsmagick-palm-bo(29816)
https://issues.rpath.com/browse/RPL-1034 External Source CONFIRM https://issues.rpath.com/browse/RPL-1034
https://issues.rpath.com/browse/RPL-811 External Source CONFIRM https://issues.rpath.com/browse/RPL-811
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765 External Source OVAL oval:org.mitre.oval:def:9765

References to Check Content

Identifier:
oval:org.mitre.oval:def:9765
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9765

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes