SB2017120616 - OpenSUSE Linux update for GraphicsMagick



SB2017120616 - OpenSUSE Linux update for GraphicsMagick

Published: December 6, 2017

Security Bulletin ID SB2017120616
Severity
Medium
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 14% Low 86%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Denial of service (CVE-ID: CVE-2017-11640)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an address access exception in the WritePTIFImage() function in coders/tiff.c. A remote attacker can trick the victim into converting a specially crafted file and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

2) Use-after-free (CVE-ID: CVE-2017-13737)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

There is an invalid free in the MagickFree function in magick/memory.c in GraphicsMagick 1.3.26 that will lead to a remote denial of service attack.


3) Resource exhaustion (CVE-ID: CVE-2017-14341)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to a large loop vulnerability in ReadWPGImage in coders/wpg.c. A remote attacker can provide a specially crafted wpg image file, trigger CPU exhaustion and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

4) Resource exhaustion (CVE-ID: CVE-2017-14342)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an error in ReadWPGImage in coders/wpg.c. A remote attacker can provide a specially crafted wpg image file, trigger memory exhaustion and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

5) Improper input validation (CVE-ID: CVE-2017-16545)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to the ReadWPGImage function in coders/wpg.c does not properly validate colormapped images. A remote attacker can transfer specially crafted WPG image, trigger ImportIndexQuantumType invalid write and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

6) Improper input validation (CVE-ID: CVE-2017-16546)

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists due to the ReadWPGImage function in coders/wpg.c does not properly validate the colormap index in a WPG palette. A remote attacker can provide a specially WPG file, trigger use of uninitialized data or invalid memory allocation and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

7) Heap-based buffer overflow (CVE-ID: CVE-2017-16669)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to heap-based buffer overflow in coders/wpg.c. A remote attacker can provide a specially crafted file, related to the AcquireCacheNexus function in magick/pixel_cache.c, trigger memory corruption and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.