---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Mandriva update for ImageMagick SECUNIA ADVISORY ID: SA22604 VERIFY ADVISORY: http://secunia.com/advisories/22604/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ Mandriva Linux 2006 http://secunia.com/product/9020/ DESCRIPTION: Mandriva has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA22572 SOLUTION: Apply updated packages. Mandriva Linux 2006 9cff2af0f77ac36aa384c7c4514f36f0 2006.0/i586/ImageMagick-6.2.4.3-1.3.20060mdk.i586.rpm 8405ecc145ef62333e6b4e786c3c140e 2006.0/i586/ImageMagick-doc-6.2.4.3-1.3.20060mdk.i586.rpm 296450899da34bbde2d56e5259686d96 2006.0/i586/libMagick8.4.2-6.2.4.3-1.3.20060mdk.i586.rpm bc576e4aa2425b60d38c97d783c982c0 2006.0/i586/libMagick8.4.2-devel-6.2.4.3-1.3.20060mdk.i586.rpm 2154b0021e296482ea3e3d8880559dcb 2006.0/i586/perl-Image-Magick-6.2.4.3-1.3.20060mdk.i586.rpm 5302895646e0bccbe9c0c5c1f4e11cec 2006.0/SRPMS/ImageMagick-6.2.4.3-1.3.20060mdk.src.rpm Mandriva Linux 2006/X86_64 37c26759a68c17030f75043060cfc2b4 2006.0/x86_64/ImageMagick-6.2.4.3-1.3.20060mdk.x86_64.rpm 4f88d24083c634afe7860e24075151ca 2006.0/x86_64/ImageMagick-doc-6.2.4.3-1.3.20060mdk.x86_64.rpm 274785820d8543a27aa254ff6a086ef2 2006.0/x86_64/lib64Magick8.4.2-6.2.4.3-1.3.20060mdk.x86_64.rpm 02a7e7432374fcb5ace201bab9a6e1d7 2006.0/x86_64/lib64Magick8.4.2-devel-6.2.4.3-1.3.20060mdk.x86_64.rpm ac8846ce3a292e4b1ffc791c10a20a74 2006.0/x86_64/perl-Image-Magick-6.2.4.3-1.3.20060mdk.x86_64.rpm 5302895646e0bccbe9c0c5c1f4e11cec 2006.0/SRPMS/ImageMagick-6.2.4.3-1.3.20060mdk.src.rpm Mandriva Linux 2007 259fc249b1dbbf6c58257b6908532140 2007.0/i586/ImageMagick-6.2.9.2-1.1mdv2007.0.i586.rpm c8ff934b06f802278f7bcd3c9d3bab96 2007.0/i586/ImageMagick-doc-6.2.9.2-1.1mdv2007.0.i586.rpm b72caa9c374ca69892255cddc521b073 2007.0/i586/libMagick10.4.0-6.2.9.2-1.1mdv2007.0.i586.rpm 0a6d767cf14550aa8a20215e01873272 2007.0/i586/libMagick10.4.0-devel-6.2.9.2-1.1mdv2007.0.i586.rpm 259991496195ecf4e7d75cc96f4f4235 2007.0/i586/perl-Image-Magick-6.2.9.2-1.1mdv2007.0.i586.rpm 5db799ea7e3150a4d124cc8468418163 2007.0/SRPMS/ImageMagick-6.2.9.2-1.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 5957de896d84e071fc73e32d184b9ff5 2007.0/x86_64/ImageMagick-6.2.9.2-1.1mdv2007.0.x86_64.rpm 2b91a2815b70a243f99b88c62664b5dc 2007.0/x86_64/ImageMagick-doc-6.2.9.2-1.1mdv2007.0.x86_64.rpm 92b14592306acfab456d2b6fe0c335cd 2007.0/x86_64/lib64Magick10.4.0-6.2.9.2-1.1mdv2007.0.x86_64.rpm 779dd5bf3491a3a3fffcbe542e761d79 2007.0/x86_64/lib64Magick10.4.0-devel-6.2.9.2-1.1mdv2007.0.x86_64.rpm 173459bbde013ce76a500b3316cac9eb 2007.0/x86_64/perl-Image-Magick-6.2.9.2-1.1mdv2007.0.x86_64.rpm 5db799ea7e3150a4d124cc8468418163 2007.0/SRPMS/ImageMagick-6.2.9.2-1.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:193 OTHER REFERENCES: SA22572: http://secunia.com/advisories/22572/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------