• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

3172

Yahoo has reportedly banished its use of ImageMagick, an image processing software which contained two vulnerabilities that could exploit the user’ s content in an unauthorized way from the memory of the Yahoo’ s private server.

Security researcher Chris Evans was the one who discovered the vulnerabilities and named the two vulnerabilities as Yahoobleed #1 and Yahoobleed #2, because they evoked the memories and used the data from the leaked server content.

The Yahoobleed #1 is a zero-day ImageMagick bug that specifically resided in the RLE (Run Length Encoded) image format. Yahoobleed #1 was caused by an " uninitialized image decode buffer" that was " used as the basis for an image rendered back to the client," Evans explained in his blog post. This vulnerability leaks server-side memory.

The Yahoobleed #2 affected Yahoo thumbnailing servers, which contains a two year old out-of-bounds error in ImageMagick’ s SUN decoder. To test out this vulnerability, Evans wrote a 40-byte SUN exploit file that exfiltrated a JPEG compressed file, from which he was able to recover raw bytes of data.

Evans further explained that seeing a random face in the JPEG file attachment that he sent to himself to test out Yahoobleed #1 spooked him out and he destroyed all files based on uninitialized memory and reported the bug to the developers of the ImageMagick.

Yahoo has paid Evans $14,000 for his work, which he plans to donate to the charity. Evans himself has been authored to fix this vulnerability.

Tags:
benjamin
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 5 )

Q

where to get the security response time window?

A

In a rare security “win” for Yahoo, which is still reeling from pair of damaging data breaches that affected hundreds of millions of accounts, the company earned the kudos of Evans for responding decisively to his vulnerability disclosures within the company’s self-imposed 90-day response time window.

Q

How does Yahoo Mail message analysis work?

A

Yahoo’s automated systems analyse all communications content (such as Mail and Messenger content including instant messages and SMS messages) and all photos and other content uploaded to your account to, without limitation, provide personally relevant product features and content, to match and serve targeted advertising and to ensure spam and malware detection and abuse protection. This analysis occurs on all communications content as it is sent, received and when it is stored, including communications content from services synced with your Yahoo account.

Q

Does Yahoo Mail automatically share my messages with anyone else?

A

Your messages are shared only with the people you want. Yahoo may anonymously share specific objects from a message with a 3rd party to provide a more relevant experience within your mail. For example, Yahoo may share a package tracking number with the shipping company so that you can easily see when your package will arrive, or may share your flight number with your airline to enable flight notifications within your inbox.

Q

Can I use Yahoo Mail and still opt-out of interest-based ads?

A

Yes. Yahoo Mail respects your choice to opt out of interest-based ads. Bear in mind that your opt-out will also apply to certain other products we offer including analysis of communications content for advertising purposes, receiving interest-based content and the receipt of data from partner sites for our analytics products. Depending on your locale, you can easily exercise this choice here, or find it via links within Yahoo Mail, as well as footer and icon links available throughout Yahoo.

Q

Does Yahoo Mail automatically share my messages with anyone else?

A

Your messages are shared only with the people you want. Yahoo may anonymously share specific objects from a message with a 3rd party to provide a more relevant experience within your mail. For example, Yahoo may share a package tracking number with the shipping company so that you can easily see when your package will arrive, or may share your flight number with your airline to enable flight notifications within your inbox.

Related Tutorials in Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

Related Tutorials in Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

How to install PHP ImageMagick on CentOS 7
How to install PHP ImageMagick on CentOS 7
Nov 4, 2017
How to Install ImageMagick on CentOS 7.6
How to Install ImageMagick on CentOS 7.6
Jun 7, 2019
How To install ImageMagick from source on centos 7
How To install ImageMagick from source on centos 7
Mar 29, 2018
How to install Imagemagick in CentOS Web Panel
How to install Imagemagick in CentOS Web Panel
Feb 15, 2017
How to Install ImageMagick 7 on Ubuntu 19.04
How to Install ImageMagick 7 on Ubuntu 19.04
Jun 6, 2019
How To Install ImageMagick (Image Manipulation) Tool on RHEL/CentOS and Fedora
How To Install ImageMagick (Image Manipulation) Tool on RHEL/CentOS and Fedora
Jun 8, 2016
How to Compile imagemagick from source, configured with webp on Centos 7.6
How to Compile imagemagick from source, configured with webp on Centos 7.6
Sep 12, 2019
How to install ImageMagick on Rocky Linux 9.2
How to install ImageMagick on Rocky Linux 9.2
Sep 7, 2023

Related Forums in Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

Related Forums in Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

CentOS
ceriaimmaculate class=
Imagemagick installation on centos 7
Oct 28, 2017
ImageMagick
gibbson class=
Image Magick failed to install
Dec 27, 2017
ImageMagick
gibbons class=
Windows : ImageMagick (6.8.1) on Laragon
Apr 6, 2018
Web Server
christian class=
Tool to scan the vulnerabilities in web server
Apr 21, 2017
Php
connor class=
cannot able to install php extension imagick
Feb 8, 2017
WHM cPanel
ethan class=
convert command is not working in cpanel
Mar 24, 2017
Ubuntu
symonds class=
What is the exact location of php.ini configuration file in Ubuntu 18.10
Apr 8, 2019
Breach-vulnerability
markdjokovic class=
clear the frozen emails in exim
Sep 26, 2018

Related News in Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

Related News in Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration

Cisco releases patches for several of its products
Cisco releases patches for several of its products
Apr 7, 2017
Schools are the most common cybercrime targets - ESET
Schools are the most common cybercrime targets - ESET
May 3, 2017
Samba vulnerability calls to mind WannaCry fears to Linux/ UNIX
Samba vulnerability calls to mind WannaCry fears to Linux/ UNIX
May 30, 2017
Patches available for Linux Sudo vulnerability
Patches available for Linux Sudo vulnerability
Jun 1, 2017
Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration
Yahoo banishes ImageMagick software after it was found vulnerable to data exfiltration
May 24, 2017
New Security Breach at Avast Aimed at Its Ccleaner Software
New Security Breach at Avast Aimed at Its Ccleaner Software
Oct 26, 2019
8.7 million customer Data Breached from Russian ISP
8.7 million customer Data Breached from Russian ISP
Oct 15, 2019
Data Breach in Sabre: Hotel reservation information intruded
Data Breach in Sabre: Hotel reservation information intruded
May 4, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ryan ?
how to use visual traceroute tool

Am using traceroute command to check for the route. i got this tool while surfing. So pls help me out installation and usage of Visual traceroute tool.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.