GraphicsMagick and ImageMagick popen() shell vulnerability via filename
As it said here: http://permalink.gmane.org/gmane.comp.security.oss.general/19669
All existing releases of GraphicsMagick and ImageMagick support a file open syntax where if the first character of the file specification is a '|', then the remainder of the filename is passed to the shell for execution using the POSIX popen(3C) function. File opening is handled by an OpenBlob() function in the source file blob.c. Unlike the vulnerability described by CVE-2016-3714, this functionality is supported by the core file opening function rather than a delegates subsystem usually used to execute external programs.
Patched versions of ImageMagick can be found here:
ImageMagick-7 : http://git.imagemagick.org/repos/ImageMagick/commit/697159d61312596aecfff9d3844f0921abc61458
ImageMagick-6 : http://git.imagemagick.org/repos/ImageMagick/commit/ca430ff77794980941ff0fa0d2fc463b50c2c6b7
You might need to manually update ImageMagick, as your OS might have or not patched version yet.
As it said here: http://permalink.gmane.org/gmane.comp.security.oss.general/19669
All existing releases of GraphicsMagick and ImageMagick support a file open syntax where if the first character of the file specification is a '|', then the remainder of the filename is passed to the shell for execution using the POSIX popen(3C) function. File opening is handled by an OpenBlob() function in the source file blob.c. Unlike the vulnerability described by CVE-2016-3714, this functionality is supported by the core file opening function rather than a delegates subsystem usually used to execute external programs.
Patched versions of ImageMagick can be found here:
ImageMagick-7 : http://git.imagemagick.org/repos/ImageMagick/commit/697159d61312596aecfff9d3844f0921abc61458
ImageMagick-6 : http://git.imagemagick.org/repos/ImageMagick/commit/ca430ff77794980941ff0fa0d2fc463b50c2c6b7
You might need to manually update ImageMagick, as your OS might have or not patched version yet.