SB2017081732 - SUSE Linux update for ImageMagick 



SB2017081732 - SUSE Linux update for ImageMagick

Published: August 17, 2017

Security Bulletin ID SB2017081732
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 25% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2017-11403)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 has an out-of-order CloseBlob call, resulting in a use-after-free via a crafted file.


2) Memory leak (CVE-ID: CVE-2017-9439)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in ReadPDBImage() function in coders/pdb.c. A remote attacker can create a specially crafted file, trick the victim into opening it and trigger denial of service attack.


3) Memory leak (CVE-ID: CVE-2017-9440)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak in ReadPSDChannel() function in coders/psd.c. A remote attacker can create a specially crafted file, trick the victim into opening it and trigger denial of service attack.


4) Reachable Assertion (CVE-ID: CVE-2017-9501)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file.


Remediation

Install update from vendor's website.