SB2017033016 - Multiple vulnerabilities in ImageMagick



SB2017033016 - Multiple vulnerabilities in ImageMagick

Published: March 30, 2017 Updated: December 8, 2020

Security Bulletin ID SB2017033016
Severity
Medium
Patch available
YES
Number of vulnerabilities 25
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 25 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2016-7523)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.


2) Out-of-bounds read (CVE-ID: CVE-2016-7524)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.


3) Out-of-bounds read (CVE-ID: CVE-2014-9829)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted sun file.


4) Input validation error (CVE-ID: CVE-2014-9804)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

vision.c in ImageMagick allows remote attackers to cause a denial of service (infinite loop) via vectors related to "too many object." <a href="http://cwe.mitre.org/data/definitions/835.html">CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')</a>


5) Input validation error (CVE-ID: CVE-2014-9805)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted pnm file.


6) Input validation error (CVE-ID: CVE-2014-9806)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (file descriptor consumption) via a crafted file.


7) Double Free (CVE-ID: CVE-2014-9807)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors.


8) Input validation error (CVE-ID: CVE-2014-9808)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.


9) Input validation error (CVE-ID: CVE-2014-9809)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted xwd image.


10) Input validation error (CVE-ID: CVE-2014-9810)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The dpx file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed dpx file.


11) Input validation error (CVE-ID: CVE-2014-9811)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.


12) NULL pointer dereference (CVE-ID: CVE-2014-9812)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted ps file.


13) Input validation error (CVE-ID: CVE-2014-9813)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted viff file.


14) NULL pointer dereference (CVE-ID: CVE-2014-9814)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted wpg file.


15) Input validation error (CVE-ID: CVE-2014-9815)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted wpg file.


16) Out-of-bounds read (CVE-ID: CVE-2014-9816)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted viff file.


17) Heap-based buffer overflow (CVE-ID: CVE-2014-9817)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted pdb file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


18) Out-of-bounds read (CVE-ID: CVE-2014-9818)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a malformed sun file.


19) Heap-based buffer overflow (CVE-ID: CVE-2014-9819)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted palm file to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


20) Heap-based buffer overflow (CVE-ID: CVE-2014-9820)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted pnm file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


21) Heap-based buffer overflow (CVE-ID: CVE-2014-9821)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted xpm file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


22) Heap-based buffer overflow (CVE-ID: CVE-2014-9822)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted quantum file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


23) Heap-based buffer overflow (CVE-ID: CVE-2014-9823)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted palm file to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


24) Heap-based buffer overflow (CVE-ID: CVE-2014-9824)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted psd file to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


25) Heap-based buffer overflow (CVE-ID: CVE-2014-9825)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in ImageMagick. A remote attacker can use a crafted psd file to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

References