Upstream information

CVE-2005-4601 at MITRE

Description

The delegate code in ImageMagick 6.2.4.5-0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 141999 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Software Development Kit 11 SP4
  • GraphicsMagick >= 1.2.5-4.33.1
  • libGraphicsMagick2 >= 1.2.5-4.33.1
  • perl-GraphicsMagick >= 1.2.5-4.33.1
openSUSE Tumbleweed
  • ImageMagick >= 7.1.0.8-1.2
  • ImageMagick-config-7-SUSE >= 7.1.0.8-1.2
  • ImageMagick-config-7-upstream >= 7.1.0.8-1.2
  • ImageMagick-devel >= 7.1.0.8-1.2
  • ImageMagick-devel-32bit >= 7.1.0.8-1.2
  • ImageMagick-doc >= 7.1.0.8-1.2
  • ImageMagick-extra >= 7.1.0.8-1.2
  • libMagick++-7_Q16HDRI5 >= 7.1.0.8-1.2
  • libMagick++-7_Q16HDRI5-32bit >= 7.1.0.8-1.2
  • libMagick++-devel >= 7.1.0.8-1.2
  • libMagick++-devel-32bit >= 7.1.0.8-1.2
  • libMagickCore-7_Q16HDRI10 >= 7.1.0.8-1.2
  • libMagickCore-7_Q16HDRI10-32bit >= 7.1.0.8-1.2
  • libMagickWand-7_Q16HDRI10 >= 7.1.0.8-1.2
  • libMagickWand-7_Q16HDRI10-32bit >= 7.1.0.8-1.2
  • perl-PerlMagick >= 7.1.0.8-1.2
Patchnames:
openSUSE Tumbleweed GA ImageMagick-7.1.0.8-1.2