How serious is this?

Open forum for security issues and info.
Forum rules
Any posts concerning pirated software or offering to buy/sell/trade commercial software are subject to removal.
User avatar
Posts: 2267
Joined: Mon Dec 05, 2005 2:35 am
Location: Vienna, Austria

How serious is this?

Unread postby Oskar45 » Fri Apr 20, 2007 12:32 am

Our corporate IPS recently detected the following:

The fingerprint HTTP_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow has matched. Detects buffer overflow exploits against ImageMagick SGI decoder component. A remote attacker can persuade a target user to download a crafted SGI file and open it with the vulnerable product. This causes the vulnerable product to be terminated or executes arbitary code with the privileges of the currently logged in user.

While you will understand that I can't tell you the exact regular expression for this matching - has anyone else encountered this situation? How serious is it?

BTW, there is no CVE entry for it.
C is opium for programmers.

Return to “SGI: Security”

Who is online

Users browsing this forum: No registered users and 2 guests