SB2022112416 - Cloud Foundry Foundation cflinuxfs3 update for ImageMagick
Published: November 24, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 17 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2021-3574)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak when executing a crafted file with the convert command. A remote attacker can force the application to leak memory and perform denial of service attack.
2) Integer overflow (CVE-ID: CVE-2022-32545)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to integer overflow in coders/psd.c in the ImageMagick when processing crafted or untrusted input. A remote attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.
3) Type conversion (CVE-ID: CVE-2022-32547)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a load of misaligned address for type 'double' in MagickCore/property.c. A remote attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.
4) Integer overflow (CVE-ID: CVE-2022-32546)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to integer overflow in coders/pcl.c in the ImageMagick when processing crafted or untrusted input. A remote attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.
5) Buffer overflow (CVE-ID: CVE-2022-28463)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing Image files. A remote attacker can pass specially crafted data to the application, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Use-after-free (CVE-ID: CVE-2022-1114)
The vulnerability allows a remote attacker can gain access to sensitive information or perform a denial of service attack.
The vulnerability exists due to a use-after-free error in RelinquishDCMInfo() function of dcm.c file. A remote attacker can pass a specially crafted DICOM image file to the application and gain access to sensitive information or perform a denial of service attack.
7) Input validation error (CVE-ID: CVE-2021-4219)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability occurs due to improper use of open functions. A remote attacker can submit a specially crafted SVG to the application and can cause a denial of service.
8) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2021-39212)
The vulnerability allows a remote attacker to bypass security restrictions.9) Information disclosure (CVE-ID: CVE-2021-20313)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to potential cipher leak when calculating signatures in TransformSignature() function in MagickCore/signature.c. A remote attacker can gain unauthorized access to sensitive information on the system.
10) Integer overflow (CVE-ID: CVE-2021-20224)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the ExportIndexQuantum() function in MagickCore/quantum-export.c. A remote attacker can pass specially crafted image data to the application, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
11) Integer overflow (CVE-ID: CVE-2021-20312)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in the WriteTHUMBNAILImage() function in coders/thumbnail.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
12) Division by zero (CVE-ID: CVE-2021-20309)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error in the WaveImage() function in MagickCore/visual-effects.c . A remote attacker can pass specially crafted image file to the application and crash it.
13) Division by zero (CVE-ID: CVE-2021-20246)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error in MagickCore/resample.c. A remote attacker can pass a specially crafted data to the application and crash it.
14) Division by zero (CVE-ID: CVE-2021-20245)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error in coders/webp.c. A remote attacker can pass a specially crafted data to the application and crash it.
15) Division by zero (CVE-ID: CVE-2021-20244)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error in MagickCore/visual-effects.c . A remote attacker can pass specially crafted data to the application and crash it.
16) Division by zero (CVE-ID: CVE-2021-20243)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error within the MagickCore/resize.c file in ImageMagick. A remote attacker can pass specially crafted data to the application and crash it.
17) Division by zero (CVE-ID: CVE-2021-20241)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error within the coders/jp2.c file in ImageMagick. A remote attacker can pass specially crafted data to the application and crash it.
Remediation
Install update from vendor's website.