severity 416096 important
thanks

On Sun, Mar 25, 2007 at 11:30:23PM +0200, Moritz Muehlenhoff wrote:
> I disagree about the severity. The code history of graphicksmagick/
> imagemagick makes it fairly obvious that they are both unsuitable
> for processing images from untrusted sources. An afternoon of fuzzing
> will most likely reveal another dozen ways to potentially trigger code
> injection.

I agree that the magicks have quite a dreadful security record, and a
glance at the code reinforces the impression. But even if we put up a
big warning sign for uses of *magicks command line utilities, the same
code paths are still touch in a number of different ways that are not
immediately obvious to the end user: Each reverse dependency of
libmagick9, libgraphicsmagick1, and perlmagick, rubymagick etc. is
affected as well, and I don't expect users to think graphicsmagick when
they start krita, or imagemagick when they run inkscape or ikiwiki. For
some of the more esoteric image formats, they're also the sole providers
of mime handlers. This makes me worried about the bugs that might allow
code injection, but ultimately it's your (the security team's) call, so
I'm lowering the severity as suggested.

I'm not aware of a more secure replacement that offers a set of features
comparable to *magick, unfortunately.

> It might be a good idea to document this more clearly, if this isn't
> done yet.

I can try to do that, but for the libraries and language bindings, it's
not obvious to me where to put that warning.

Regards,

Daniel.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to