Untrusted search path vulnerability in configure.c in ImageMagick before 6.6.5-5, when MAGICKCORE_INSTALLED_SUPPORT is defined, allows local users to gain privileges via a Trojan horse configuration file in the current working directory.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2010-11-22 12:00
Updated : 2018-01-05 18:29
NVD link : CVE-2010-4167
Mitre link : CVE-2010-4167
JSON object : View
CWE
Products Affected
imagemagick
- imagemagick