Lucene search

K
archlinuxArch LinuxASA-201605-6
HistoryMay 05, 2016 - 12:00 a.m.

imagemagick: arbitrary code execution

2016-05-0500:00:00
Arch Linux
lists.archlinux.org
32

0.967 High

EPSS

Percentile

99.7%

It was discovered that ImageMagick did not properly sanitize certain
input before passing it to the delegate functionality. A remote
attacker could create a specially crafted image that, when processed by
an application using ImageMagick or an unsuspecting user using the
ImageMagick utilities, would lead to arbitrary execution of shell
commands with the privileges of the user running the application.

OSVersionArchitecturePackageVersionFilename
anyanyanyimagemagick<ย 6.9.3.10-1UNKNOWN