Vigil@nce - ImageMagick: three vulnerabilities
February 2016 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of ImageMagick.
– Impacted products: Fedora.
– Severity: 2/4.
– Creation date: 09/12/2015.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in ImageMagick.
An attacker can generate a buffer overflow in coders/icon.c, in
order to trigger a denial of service, and possibly to run code.
[severity:2/4]
An attacker can force the usage of a freed memory area in
coders/pict.c, in order to trigger a denial of service, and
possibly to run code. [severity:2/4]
An attacker can force the usage of a freed memory area in
coders/tga.c, in order to trigger a denial of service, and
possibly to run code. [severity:2/4]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/ImageMagick-three-vulnerabilities-18481