Ubuntu update for imagemagick



Risk High
Patch available YES
Number of vulnerabilities 25
CVE-ID CVE-2019-16710
CVE-2019-13297
CVE-2019-13310
CVE-2019-13305
CVE-2019-15140
CVE-2019-13301
CVE-2019-13307
CVE-2019-13304
CVE-2019-15141
CVE-2019-15139
CVE-2019-16708
CVE-2019-16712
CVE-2019-16709
CVE-2019-19949
CVE-2019-13295
CVE-2019-16711
CVE-2019-19948
CVE-2019-13300
CVE-2019-13135
CVE-2019-13311
CVE-2019-13454
CVE-2019-13309
CVE-2019-16713
CVE-2019-7175
CVE-2019-13306
CWE-ID CWE-401
CWE-125
CWE-399
CWE-121
CWE-416
CWE-122
CWE-20
CWE-369
Exploitation vector Network
Public exploit Public exploit code for vulnerability #10 is available.
Public exploit code for vulnerability #14 is available.
Public exploit code for vulnerability #17 is available.
Public exploit code for vulnerability #21 is available.
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

libmagick++5 (Ubuntu package)
Operating systems & Components / Operating system package or component

libmagickcore5-extra (Ubuntu package)
Operating systems & Components / Operating system package or component

libmagickwand5 (Ubuntu package)
Operating systems & Components / Operating system package or component

libmagickcore5 (Ubuntu package)
Operating systems & Components / Operating system package or component

libmagickcore-dev (Ubuntu package)
Operating systems & Components / Operating system package or component

imagemagick (Ubuntu package)
Operating systems & Components / Operating system package or component

perlmagick (Ubuntu package)
Operating systems & Components / Operating system package or component

libmagick++-dev (Ubuntu package)
Operating systems & Components / Operating system package or component

libmagickwand-dev (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 25 vulnerabilities.

1) Memory leak

EUVDB-ID: #VU31997

Risk: Medium

CVSSv3.1: 5.7 [AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16710

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU21070

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13297

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read in AdaptiveThresholdImage in the "MagickCore/threshold.c" file because a height of zero is mishandled. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource management error

EUVDB-ID: #VU21067

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13310

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists because of a memory leak in AcquireMagickMemory due to an error in "MagickWand/mogrify.c" file. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Stack-based buffer overflow

EUVDB-ID: #VU21077

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13305

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WritePNMImage in the coders/pnm.c file because of a misplaced "strncpy" and "an off-by-one" error. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU21055

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-15140

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system

The vulnerability exists in "ReadImage" in the "MagickCore/constitute.c" file due to a use-after-free error when the affected software does improper memory operations. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Resource management error

EUVDB-ID: #VU21069

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13301

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists because of a memory leak in AcquireMagickMemory due to an AnnotateImage error. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Heap-based buffer overflow

EUVDB-ID: #VU21079

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13307

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the EvaluateImages in the "MagickCore/statistic.c" file because of mishandling rows. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Stack-based buffer overflow

EUVDB-ID: #VU21076

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13304

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WritePNMImage in the "coders/pnm.c" file because of a misplaced assignment. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU21062

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-15141

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in "WriteTIFFImage" within coders/tiff.c" file. A remote attacker can create a specially crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in "tif_dirwrite.c" of LibTIFF, trick the victim into opening it, trigger out-of-bounds read error and crash the application.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds read

EUVDB-ID: #VU21061

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-15139

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) condition on the target system.

The vulnerability exists in "ReadXWDImage" in the "coders/xwd.c" file due to a boundary condition when reading on XWD files. A remote attacker can create a specially crafted XWD image file, trick the victim into opening it, trigger out-of-bounds read error and crash the application.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

11) Memory leak

EUVDB-ID: #VU31999

Risk: Medium

CVSSv3.1: 5.7 [AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16708

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within magick/xwindow.c, related to XCreateImage. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Memory leak

EUVDB-ID: #VU31995

Risk: Medium

CVSSv3.1: 5.7 [AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16712

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU31998

Risk: Medium

CVSSv3.1: 5.7 [AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16709

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within coders/dps.c, as demonstrated by XCreateImage. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Out-of-bounds read

EUVDB-ID: #VU24030

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-19949

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due missing length check prior pointer dereference in the "WritePNGImage" function of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare. A remote attacker can cause a denial of service condition on the target system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

15) Out-of-bounds read

EUVDB-ID: #VU21063

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13295

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read error in "AdaptiveThresholdImage" in the "MagickCore/threshold.c" file because a width of zero is mishandled. A remote attacker can trick the victim to open a specially crafted file, trigger out-of-bounds read error and crash the application.


Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Memory leak

EUVDB-ID: #VU31996

Risk: Medium

CVSSv3.1: 5.7 [AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16711

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within Huffman2DEncodeImage in coders/ps2.c. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Heap-based buffer overflow

EUVDB-ID: #VU24029

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-19948

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due insufficient validation of row and column sizes in the "WriteSGIImage" function of coders/sgi.c. A remote attacker can trigger heap-based buffer overflow and cause a denial of service condition on the target system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

18) Heap-based buffer overflow

EUVDB-ID: #VU21073

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13300

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the EvaluateImages in the "MagickCore/statistic.c" file because of mishandling columns. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Input validation error

EUVDB-ID: #VU21095

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13135

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use of uninitialized value in the "ReadCUTImage" function in the "coders/cut.c" file. A remote attacker can execute arbitrary command on the target system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Resource management error

EUVDB-ID: #VU21065

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13311

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a memory leak in AcquireMagickMemory due to an error in the "wand/mogrify.c" file. A remote attacker can perform a denial of service attack on the target system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Division by zero

EUVDB-ID: #VU19185

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-13454

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause a denial of service (DoS) condition on a system.

The vulnerability exists due to a divide-by-zero condition in the "RemoveDuplicateLayers" function, as defined in the "MagickCore/layer.c" file. A remote attacker can make calls on the targeted system and cause a DoS condition.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

22) Resource management error

EUVDB-ID: #VU21066

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13309

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists because of a memory leak in AcquireMagickMemory due to mishandling the NoSuchImage error in CLIListOperatorImages in the "MagickWand/operation.c" file. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Memory leak

EUVDB-ID: #VU31994

Risk: Medium

CVSSv3.1: 5.7 [AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16713

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c. A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Memory leak

EUVDB-ID: #VU18390

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-7175

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak in the DecodeImage() function in coders/pcd.c. A remote attacker can create a specially crafted image file and perform denial of service attack.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Stack-based buffer overflow

EUVDB-ID: #VU21078

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13306

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in WritePNMImage in the "coders/pnm.c" file because of "off-by-one" errors. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package imagemagick to the latest version.

Vulnerable software versions

Ubuntu: 14.04

libmagick++5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5-extra (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore5 (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickcore-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

imagemagick (Ubuntu package): before Ubuntu Pro (Infra-only)

perlmagick (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagick++-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

libmagickwand-dev (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

http://ubuntu.com/security/notices/USN-7053-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###