ALAS-2016-717 ---- GraphicsMagickID: oval:org.secpod.oval:def:1600420 | Date: (C)2016-06-27 (M)2023-08-07 |
Class: PATCH | Family: unix |
It was discovered that GraphicsMagick did not properly sanitize certain input before using it to invoke processes. A remote attacker could create a specially crafted image that, when processed by an application using GraphicsMagick or an unsuspecting user using the GraphicsMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. Vulnerabilities in GraphicsMagick"s SVG processing code were discovered, resulting in memory corruption and, potentially, execution of arbitrary code, a denial of service, or an application crash
Platform: |
Amazon Linux AMI |