Описание
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
It was discovered that ImageMagick did not properly sanitize certain input before using it to invoke processes. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | ImageMagick | Affected | ||
Red Hat OpenShift Enterprise 2 | ImageMagick | Affected | ||
Red Hat Enterprise Linux 6 | ImageMagick | Fixed | RHSA-2016:1237 | 16.06.2016 |
Red Hat Enterprise Linux 7 | ImageMagick | Fixed | RHSA-2016:1237 | 16.06.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and Im ...
EPSS
6.8 Medium
CVSS2