Vigil@nce - imagemagick: buffer overflow of Comments
September 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow of imagemagick, in
order to trigger a denial of service, and possibly to execute code.
Impacted products: Debian, Unix (platform)
Severity: 2/4
Creation date: 30/08/2013
DESCRIPTION OF THE VULNERABILITY
The ImageMagick application is used to process images.
A GIF image can contain a comment block. ImageMagick allocates a
memory area to store it. However, the terminator ’\0’ is set after
the end of the array.
An attacker can therefore generate a buffer overflow in
imagemagick, in order to trigger a denial of service, and possibly
to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/imagemagick-buffer-overflow-of-Comments-13336