aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-01-18 09:02:45 +0800
committersimon <simon@FreeBSD.org>2005-01-18 09:02:45 +0800
commit2637e02e5c1921553a23f15c693c8cfd15e9c84d (patch)
tree715302b0396bd191df11cc9b8e4c982ebcbb28d0
parente8752cff1df80425eef713ceaf0900e7b20bacc1 (diff)
downloadfreebsd-ports-gnome-2637e02e5c1921553a23f15c693c8cfd15e9c84d.tar.gz
freebsd-ports-gnome-2637e02e5c1921553a23f15c693c8cfd15e9c84d.tar.zst
freebsd-ports-gnome-2637e02e5c1921553a23f15c693c8cfd15e9c84d.zip
Document security vulnerability in ImageMagick.
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 88a65eea17c8..cdfae432dfb6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,42 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="597e2bee-68ea-11d9-a9e7-0001020eed82">
+ <topic>ImageMagick -- PSD handler heap overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>ImageMagick</name>
+ <range><lt>6.1.8.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>An iDEFENSE Security Advisory reports:</p>
+ <blockquote cite="http://www.idefense.com/application/poi/display?id=184&amp;type=vulnerabilities">
+ <p>Remote exploitation of a buffer overflow vulnerability in
+ The ImageMagick's Project's ImageMagick PSD image-decoding
+ module could allow an attacker to execute arbitrary
+ code.</p>
+ <p>Exploitation may allow attackers to run arbitrary code on
+ a victim's computer if the victim opens a specially
+ formatted image. Such images could be delivered by e-mail
+ or HTML, in some cases, and would likely not raise
+ suspicion on the victim's part. Exploitation is also
+ possible when a web-based application uses ImageMagick to
+ process user-uploaded image files.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CAN-2005-0005</cvename>
+ <url>http://www.idefense.com/application/poi/display?id=184&amp;type=vulnerabilities</url>
+ </references>
+ <dates>
+ <discovery>2004-12-21</discovery>
+ <entry>2005-01-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7850a238-680a-11d9-a9e7-0001020eed82">
<topic>cups-lpr -- lppasswd multiple vulnerabilities</topic>
<affects>