SB2017122803 - Debian update for imagemagick



SB2017122803 - Debian update for imagemagick

Published: December 28, 2017

Security Bulletin ID SB2017122803
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2017-12877)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in the DestroyImage function in image.c in ImageMagick before 7.0.6-6. A remote attacker can cause a denial of service via a specially crafted file.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Improper input validation (CVE-ID: CVE-2017-16546)

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists due to the ReadWPGImage function in coders/wpg.c does not properly validate the colormap index in a WPG palette. A remote attacker can provide a specially WPG file, trigger use of uninitialized data or invalid memory allocation and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

3) Use-after-free (CVE-ID: CVE-2017-17499)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error in Magick::Image::read in Magick++/lib/Image.cpp. A remote attacker can create create a specially crafted media file, trick the victim into opening it, and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Buffer over-read (CVE-ID: CVE-2017-17504)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to coders/png.c Magick_png_read_raw_profile heap-based buffer over-read via a specially crafted file, related to ReadOneMNGImage. A remote attacker can perform a denial of service attack.



5) Buffer over-read (CVE-ID: CVE-2017-17879)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error. A remote attacker can perform a denial of service attack.



Remediation

Install update from vendor's website.