CVE-2006-5456

CVSS V2 Medium 5.1 CVSS V3 None
Description
Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
Overview
  • CVE ID
  • CVE-2006-5456
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2006-10-23T17:07:00
  • Last Modified Date
  • 2018-10-17T21:43:03
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:* 1 OR 1.1.6
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5.1
  • Severity
  • MEDIUM
  • Exploitability Score
  • 4.9
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210921 Patch
http://packages.debian.org/changelogs/pool/main/g/graphicsmagick/graphicsmagick_1.1.7-9/changelog#versionversion1.1.7-9
http://www.securityfocus.com/bid/20707
http://secunia.com/advisories/22569 Vendor Advisory
http://secunia.com/advisories/22572 Vendor Advisory
http://secunia.com/advisories/22604 Vendor Advisory
http://www.ubuntu.com/usn/usn-372-1
http://secunia.com/advisories/22601 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-07.xml
http://secunia.com/advisories/22819 Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_66_imagemagick.html
http://secunia.com/advisories/22834 Vendor Advisory
http://www.debian.org/security/2006/dsa-1213
http://secunia.com/advisories/22998 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-19.xml
http://secunia.com/advisories/23121 Vendor Advisory
https://issues.rpath.com/browse/RPL-811
http://secunia.com/advisories/23090 Vendor Advisory
https://issues.rpath.com/browse/RPL-1034
http://www.redhat.com/support/errata/RHSA-2007-0015.html Vendor Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.352092
http://www.novell.com/linux/security/advisories/2007_3_sr.html
http://www.ubuntu.com/usn/usn-422-1
http://www.osvdb.org/29990
http://secunia.com/advisories/24186 Vendor Advisory
http://secunia.com/advisories/24196 Vendor Advisory
http://secunia.com/advisories/24458 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:193
http://www.mandriva.com/security/advisories?name=MDKSA-2007:041
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
http://secunia.com/advisories/24284 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4171 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4170 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29816
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9765
http://www.securityfocus.com/archive/1/459507/100/0/threaded
http://www.securityfocus.com/archive/1/452718/100/100/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:12:08 Added to TrackCVE