Results 1 to 3 of 3

Thread: GraphicsMagick and ImageMagick popen() shell vulnerability

  1. #1
    Join Date
    Apr 2005
    Location
    GMT +7.00
    Posts
    13,750

    GraphicsMagick and ImageMagick popen() shell vulnerability

    GraphicsMagick and ImageMagick popen() shell vulnerability via filename

    As it said here: http://permalink.gmane.org/gmane.com....general/19669

    All existing releases of GraphicsMagick and ImageMagick support a file open syntax where if the first character of the file specification is a '|', then the remainder of the filename is passed to the shell for execution using the POSIX popen(3C) function. File opening is handled by an OpenBlob() function in the source file blob.c. Unlike the vulnerability described by CVE-2016-3714, this functionality is supported by the core file opening function rather than a delegates subsystem usually used to execute external programs.


    Patched versions of ImageMagick can be found here:


    ImageMagick-7 : http://git.imagemagick.org/repos/Ima...4f0921abc61458
    ImageMagick-6 : http://git.imagemagick.org/repos/Ima...fc463b50c2c6b7

    You might need to manually update ImageMagick, as your OS might have or not patched version yet.
    Regards, Alex G.

    - Get the best commercial DirectAdmin support and hire me on poralix.com
    - Follow and like @Poralix on Facebook

  2. #2
    Join Date
    Jun 2016
    Posts
    2

    Instructions for manual update

    Does anyone have instructions on how to manually update ImageMagick?

  3. #3
    Join Date
    Apr 2005
    Location
    GMT +7.00
    Posts
    13,750
    General instructions can be found here: http://imagemagick.org/script/install-source.php

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •