Description
Integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large (1) bytes_per_pixel, (2) columns, and (3) rows values, which trigger a heap-based buffer overflow.
Exploits
283832006-08-14dosLinux
ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow
By Damian Put
References
cve@mitre.org
http://secunia.com/advisories/21462cve@mitre.org
http://secunia.com/advisories/21525cve@mitre.org
http://secunia.com/advisories/21621cve@mitre.org
http://secunia.com/advisories/21671cve@mitre.org
http://secunia.com/advisories/21679cve@mitre.org
http://secunia.com/advisories/21832cve@mitre.org
http://secunia.com/advisories/22036cve@mitre.org
http://secunia.com/advisories/22096cve@mitre.org
http://secunia.com/advisories/22998cve@mitre.org
http://security.gentoo.org/glsa/glsa-200609-14.xmlcve@mitre.org
http://securityreason.com/securityalert/1385cve@mitre.org
http://securitytracker.com/id?1016699cve@mitre.org
http://www.debian.org/security/2006/dsa-1213cve@mitre.org
http://www.overflow.pl/adv/imsgiheap.txtcve@mitre.org
http://www.securityfocus.com/bid/19507cve@mitre.org
http://www.ubuntu.com/usn/usn-337-1cve@mitre.org
https://issues.rpath.com/browse/RPL-605cve@mitre.org
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11129af854a3a-2127-422b-91ae-364da2661108
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.ascaf854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21462af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21525af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21621af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21671af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21679af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21832af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22036af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22096af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22998af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200609-14.xmlaf854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/1385af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016699af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1213af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:155af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_50_imagemagick.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.overflow.pl/adv/imsgiheap.txtaf854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0633.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443208/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443362/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19507af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-337-1af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/28372af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-605af854a3a-2127-422b-91ae-364da2661108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11129