lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 11 Nov 2007 19:54:03 -0900
From: Foresight Linux Essential Announcement Service <foresight-security-noreply@...esightlinux.org>
To: foresight-security-announce@...ts.rpath.org
Cc: security-alerts@...uxsecurity.com,
	full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	lwn@....net
Subject: FLEA-2007-0066-1 ImageMagick

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Foresight Linux Essential Advisory: 2007-0066-1
Published: 2007-11-11

Rating: Moderate

Updated Versions:
    ImageMagick=/foresight.rpath.org@fl:1-devel//1/6.3.6.9-1-1
    group-dist=/foresight.rpath.org@fl:1-devel//1/1.4.1-0.2-3

References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988

Description:
    Previous versions of the ImageMagick package are vulnerable to multiple
    attacks whereby an attacker might be able to execute arbitrary code by
    coercing the user into opening specially-crafted files with ImageMagick.

- ---

Copyright 2007 Foresight Linux Project
This file is distributed under the terms of the MIT License.
A copy is available at http://www.foresightlinux.org/permanent/mit-license.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)
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=2VH9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ