RHEL 3 / 4 : ImageMagick (RHSA-2005:413)

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated ImageMagick packages that fix a buffer overflow issue are now

This update has been rated as having important security impact by the
Red Hat Security Response Team.

ImageMagick(TM) is an image display and manipulation tool for the X
Window System which can read and write multiple image formats.

A heap based buffer overflow bug was found in the way ImageMagick
parses PNM files. An attacker could execute arbitrary code on a
victim's machine if they were able to trick the victim into opening a
specially crafted PNM file. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-1275 to this

Users of ImageMagick should upgrade to these updated packages, which
contain a backported patch, and are not vulnerable to this issue.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Red Hat Local Security Checks

Nessus Plugin ID: 18385 ()

Bugtraq ID:

CVE ID: CVE-2005-1275

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now