Short Name |
HTTP:OVERFLOW:IMAGEMAGICK-SGI |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
ImageMagick SGI File Handling Buffer Overflow |
Release Date |
2011/07/05 |
Update Number |
1949 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in ImageMagick SGI decoder. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
ImageMagick is prone to a remote heap buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows attackers to execute arbitrary machine code in the context of applications that use the ImageMagick library. ImageMagick versions in the 6.x series, up to version 6.2.8, are vulnerable to this issue.