BugTraq
ImageMagick's Overflow Jul 14 2003 11:31AM
Angelo Rosiello (guilecool usa com)


ImageMagick's Overflow

Rosiello Security's Advisory

&

DTORS

http://www.rosiello.org

I. BACKGROUND

The ImageMagick (display) is an image viewer.

ImageMagick is part of the KDE desktop and is

bundled with all major Linux distributions.

II. DESCRIPTION

A vulnerability was found in this application that could lead to the

execution of arbitrary code with the privileges of the user running the

program.

This vulnerability can be exploited from within email clients that use

ImageMagick

as default for image viewing.

It is possible that an user could load the "malicious" file

directly,exploiting him self.

III. ANALYSYS

Class: Input validation error

Remotely Exploitable: No

Locally Exploitable: Yes but hardly

Exploitation can provide local attackers with user access to an affected

system.

The following shows how the "malicious" file can cause the crash of

ImageMagick.

[root@localhost root]# ls -l /usr/X11R6/bin/display

-rwxr-xr-x 1 root root 30564 Mar 14 2002 /usr/X11R6/bin/display

[root@localhost root]# touch %x

[root@localhost root]# gdb display

(gdb) r

Starting program: /usr/X11R6/bin/display

[New Thread 1024 (LWP 757)]

At this point open the file "%x" via ImageMagick.

On the gdb prompt you will see the following:

Program received signal SIGSEGV, Segmentation fault.

[Switching to Thread 1024 (LWP 757)]

0x4003cf0b in SetExceptionInfo () from /usr/X11R6/lib/libMagick.so.5

(gdb)

IV. DETECTION

All distributions supporting ImageMagick are affected.

Red Hat, Mandrake, Suse and maybe others.

Vulnerable Packages:

Up to 5.4.3.x, all versions are vulnerable but the last one.

Mainteiners were informed and consented about this Advisory.

VI. CREDITS

This vulnerability was found by Angelo Rosiello.

http://www.rosiello.org

&

http://www.dtors.net

CONTACT: angelo (at) rosiello (dot) org [email concealed]

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus