Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | ImageMagick | 2012-05-08 23:14 | ALAS-2012-76 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 2.6 | AV:L/AC:H/Au:N/C:P/I:P/A:N |
NVD | CVSSv2 | 6.9 | AV:L/AC:M/Au:N/C:C/I:C/A:C |