SB2017072302 - Multiple vulnerabilities in ImageMagick
Published: July 23, 2017 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2017-13139)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
2) Improper Check for Unusual or Exceptional Conditions (CVE-ID: CVE-2017-13142)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, a crafted PNG file could trigger a crash because there was an insufficient check for short files.
3) Resource exhaustion (CVE-ID: CVE-2017-11526)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The ReadOneMNGImage function in coders/png.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted file.
4) Input validation error (CVE-ID: CVE-2017-11528)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
5) Input validation error (CVE-ID: CVE-2017-11529)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The ReadMATImage function in coders/mat.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
6) Resource exhaustion (CVE-ID: CVE-2017-11530)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The ReadEPTImage function in coders/ept.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
Remediation
Install update from vendor's website.
References
- http://www.securityfocus.com/bid/100494
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870109
- https://github.com/ImageMagick/ImageMagick/commit/22e0310345499ffe906c604428f2a3a668942b05
- https://security.gentoo.org/glsa/201711-07
- https://usn.ubuntu.com/3681-1/
- https://www.debian.org/security/2017/dsa-4019
- https://www.debian.org/security/2017/dsa-4040
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870105
- https://github.com/ImageMagick/ImageMagick/commit/46e3aabbf8d59a1bdebdbb65acb9b9e0484577d3
- https://github.com/ImageMagick/ImageMagick/commit/aa84944b405acebbeefe871d0f64969b9e9f31ac
- https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html
- http://www.securityfocus.com/bid/99932
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867825
- https://github.com/ImageMagick/ImageMagick/issues/527
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867811
- https://github.com/ImageMagick/ImageMagick/issues/522
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867823
- https://github.com/ImageMagick/ImageMagick/issues/525
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867821
- https://github.com/ImageMagick/ImageMagick/issues/524