Revision Date: | 2013-04-29 | Version: | 11 | Title: | Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters. | Description: | Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote attackers to execute arbitrary code via a .PSD image file with a large number of layers. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2005-0005
| Platform(s): | CentOS Linux 3 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4
| Product(s): | | Definition Synopsis | OS Section: RHEL3, CentOS3 RHEL3 or CentOS3
The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND Configuration section
ImageMagick-c++-devel is earlier than 0:5.5.6-13
OR ImageMagick is earlier than 0:5.5.6-13
OR ImageMagick-perl is earlier than 0:5.5.6-13
OR ImageMagick-devel is earlier than 0:5.5.6-13
OR ImageMagick-c++ is earlier than 0:5.5.6-13
OR OS Section: RHEL4, CentOS4, Oracle Linux 4
RHEL4, CentOS4 or Oracle Linux 4
The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
ImageMagick-c++-devel is earlier than 0:6.0.7.1-6
OR ImageMagick is earlier than 0:6.0.7.1-6
OR ImageMagick-perl is earlier than 0:6.0.7.1-6
OR ImageMagick-devel is earlier than 0:6.0.7.1-6
OR ImageMagick-c++ is earlier than 0:6.0.7.1-6
|
|