exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

imagemagick.html

imagemagick.html
Posted Jul 20, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

ImageMagick, the popular image viewer bundled with various distributions of Linux and sometimes used as the defacto image viewer in mail clients, has a vulnerability that can lead to arbitrary code execution with the privileges of the user running the program.

tags | advisory, arbitrary, code execution
systems | linux
SHA-256 | 5a4292f4fc03c31a1515095fe313548698146bb7a2b590e49fd261404826ab6e

imagemagick.html

Change Mirror Download
<html>
<BODY TEXT="#000000" BGCOLOR="#DBF0FF" LINK="#0000FF" VLINK="#008080" ALINK="#800000" title="bugs">
<b><font face="Arial Black" size="6"><u><p align="center">vulnerabilities</p></u></font></b>
<p><hr><p>

<p><h4 align = 'center'>2003-07-14</h4><p><b><h2 align = 'center'><FONT COLOR='#FF0000'>ImageMagick's Segmentation fault</b></FONT></h2><p><p><center><h2><b>Rosiello Security's Advisory</b></h2></center>
<p><b>I. BACKGROUND</b>
<br>
The ImageMagick (display) is an image viewer.<br>
ImageMagick is part of the KDE desktop and is<br>
bundled with all major Linux distributions.<br>

<p><b>II. DESCRIPTION</b>
<br>
A vulnerability was found in this application that could lead to the<br>
execution of arbitrary code with the privileges of the user running the program.<br>
This vulnerability can be exploited from within email clients that use ImageMagick<br>
as default for image viewing.<br>
It is possible that an user could load the "malicious" file directly,exploiting him self.
<br>
<p><b>III. ANALYSYS</b>
<br>
Class: Input validation error<br>
Remotely Exploitable: No<br>
Locally Exploitable: Yes but hardly<br>

Exploitation can provide local attackers with user access to an affected system.<br>

The following shows how the "malicious" file can cause the crash of ImageMagick.<br>

[root@localhost root]# ls -l /usr/X11R6/bin/display<br>
-rwxr-xr-x 1 root root 30564 Mar 14 2002 /usr/X11R6/bin/display<br>
[root@localhost root]# touch %x<br>
[root@localhost root]# gdb display<br>
(gdb) r<br>
Starting program: /usr/X11R6/bin/display<br>
[New Thread 1024 (LWP 757)]<br>
<br><br>
At this point open the file "%x" via ImageMagick.<br>
On the gdb prompt you will see the following:<br>
<br>
Program received signal SIGSEGV, Segmentation fault.<br>
[Switching to Thread 1024 (LWP 757)]<br>
0x4003cf0b in SetExceptionInfo () from /usr/X11R6/lib/libMagick.so.5<br>
(gdb)<br>

<p><b>IV. DETECTION</b>
<br>
All distributions supporting ImageMagick are affected.<br>
Red Hat, Mandrake, Suse and maybe others.<br>

Vulnerable Packages:<br>
Up to 5.4.3.x, all versions are vulnerable but the last one.<br>
Mainteiners were informed and consented about this Advisory.

<p><b>VI. CREDITS</b>
<br>
This vulnerability was found by Angelo Rosiello.<br>
<br>
https://www.rosiello.org<br>
&<br>
https://www.dtors.net<br>
<br>
CONTACT: <b>angelo@rosiello.org</b><br>
<p><b>Software: <a href='../archivio/'></b></a></body>
</html>
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close