This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
Andrei Nigmatulin discovered a heap based buffer overflow flaw in the
ImageMagick image handler. An attacker could create a carefully
crafted Photoshop Document (PSD) image in such a way that it would
cause ImageMagick to execute arbitrary code when processing the image.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0005 to this issue.
A format string bug was found in the way ImageMagick handles
filenames. An attacker could execute arbitrary code in a victims
machine if they are able to trick the victim into opening a file with
a specially crafted name. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-0397 to this
A bug was found in the way ImageMagick handles TIFF tags. It is
possible that a TIFF image file with an invalid tag could cause
ImageMagick to crash.
A bug was found in ImageMagick's TIFF decoder. It is possible that a
specially crafted TIFF image file could cause ImageMagick to crash.
A bug was found in the way ImageMagick parses PSD files. It is
possible that a specially crafted PSD file could cause ImageMagick to
A heap overflow bug was found in ImageMagick's SGI parser. It is
possible that an attacker could execute arbitrary code by tricking a
user into opening a specially crafted SGI image file.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5