SB2018010437 - SUSE Linux update for ImageMagick



SB2018010437 - SUSE Linux update for ImageMagick

Published: January 4, 2018

Security Bulletin ID SB2018010437
Severity
High
Patch available
YES
Number of vulnerabilities 9
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 11% Medium 67% Low 22%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 9 secuirty vulnerabilities.


1) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2017-12563)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service.


2) Resource exhaustion (CVE-ID: CVE-2017-12691)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the ReadOneLayer function in coders/xcf.c due to memory consumption. A remote attacker can submit a specially crafted file, trick the victim into opening it, trigger memory corruption and cause the service to crash.

3) Input validation error (CVE-ID: CVE-2017-13061)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file.


4) Memory leak (CVE-ID: CVE-2017-13062)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the function formatIPTC in coders/meta.c. A remote attacker can perform a denial of service attack via a a crafted file.


5) Buffer overflow (CVE-ID: CVE-2017-14042)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.


6) Input validation error (CVE-ID: CVE-2017-14174)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.


7) Memory leak (CVE-ID: CVE-2017-14343)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in ReadXCFImage in coders/xcf.c via due to memory leak. A remote attacker can trick the victim into opening a specially crafted crafted xcf image file and cause the service to crash.


8) Information disclosure (CVE-ID: CVE-2017-15277)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.


9) Buffer overflow (CVE-ID: CVE-2017-15281)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)."


Remediation

Install update from vendor's website.