Multiple vulnerabilities in GraphicsMagick



Published: 2019-04-24 | Updated: 2020-03-31
Risk Medium
Patch available YES
Number of vulnerabilities 11
CVE-ID CVE-2019-11473
CVE-2019-11505
CVE-2019-11506
CVE-2019-11474
CVE-2019-11005
CVE-2019-11006
CVE-2019-11007
CVE-2019-11008
CVE-2019-11009
CVE-2019-11010
CVE-2019-12921
CWE-ID CWE-125
CWE-122
CWE-682
CWE-121
CWE-401
CWE-22
Exploitation vector Network
Public exploit Public exploit code for vulnerability #11 is available.
Vulnerable software
Subscribe
GraphicsMagick
Universal components / Libraries / Libraries used by multiple products

Vendor GraphicsMagick Group

Security Bulletin

This security bulletin contains information about 11 vulnerabilities.

Updated: 31.03.2020

Added vulnerability #11.

1) Out-of-bounds read

EUVDB-ID: #VU18361

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11473

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to a boundary condition within the ReadXWDImage() function in coders/xwd.c in XWD reader. A remote attacker can create a specially crafted XWD image file, pass it to the affected application, trigger out-of-bounds read error and crash the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.3.31

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/5402c5cbd8bd
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/944dcbc457f8
http://www.graphicsmagick.org/NEWS.html#june-15-2019
http://www.graphicsmagick.org/Changelog.html
http://www.securityfocus.com/bid/108055


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Heap-based buffer overflow

EUVDB-ID: #VU18359

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11505

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in function WritePDBImage() in coders/pdb.c. A remote attacker can create a specially crafted image file, pass it to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update to version 1.4 snapshot-20190403 Q8.

Vulnerable software versions

GraphicsMagick: 1.3.8 - 1.3.31

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/85f5bdcd246a
http://sourceforge.net/p/graphicsmagick/bugs/605/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Heap-based buffer overflow

EUVDB-ID: #VU18360

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11506

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in MAT writer within the function WriteMATLABImage of coders/mat.c, related to ExportRedQuantumType in magick/export.c. A remote attacker can create a crafted image file, pass it to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update to version 1.4 snapshot-20190403 Q8.

Vulnerable software versions

GraphicsMagick: 1.3.30 - 1.3.31

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/57ac0ae85e2a
http://sourceforge.net/p/graphicsmagick/bugs/604/
http://www.graphicsmagick.org/NEWS.html#june-15-2019


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Incorrect calculation

EUVDB-ID: #VU18362

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11474

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the ReadXWDImage() function in coders/xwd.c in XWD reader. A remote attacker can create a specially crafted XWD file, pass it to the application, trigger a floating-point exception and crash the affected application.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.3.31

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/5402c5cbd8bd
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/944dcbc457f8
http://www.graphicsmagick.org/Changelog.html
http://www.securityfocus.com/bid/108055
http://www.graphicsmagick.org/NEWS.html#june-15-2019


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Stack-based buffer overflow

EUVDB-ID: #VU18363

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11005

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing a quoted font family value within the SVGStartElement() function in coders/svg.c in SVG reader. A remote unauthenticated attacker can create a specially crafted image, pass it to the affected application, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update to version 1.3.32 or 1.4 snapshot-20190322 Q8.

Vulnerable software versions

GraphicsMagick: 1.3.31

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
http://sourceforge.net/p/graphicsmagick/bugs/600/
http://www.graphicsmagick.org/NEWS.html#june-15-2019


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU18364

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11006

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c in MIFF reader, which allows attackers to cause a denial of service or information disclosure via an RLE packet. A remote attacker can perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.3.31

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
http://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
http://sourceforge.net/p/graphicsmagick/bugs/598/
http://www.graphicsmagick.org/NEWS.html#june-15-2019


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds read

EUVDB-ID: #VU18365

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11007

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap. A remote attacker can perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.4

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98
http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
http://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
http://sourceforge.net/p/graphicsmagick/bugs/596/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Heap-based buffer overflow

EUVDB-ID: #VU18366

Risk: Medium

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11008

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the WriteXWDImage() function in coders/xwd.c. A remote attacker can create a crafted XWD file, pass it to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.4

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
http://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
http://sourceforge.net/p/graphicsmagick/bugs/599/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU18367

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11009

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read in the function ReadXWDImage() in coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file. A remote attacker can perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.4

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
http://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
http://sourceforge.net/p/graphicsmagick/bugs/597/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Memory leak

EUVDB-ID: #VU18368

Risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11010

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file. A remote attacker can perform a denial of service attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.4

External links

http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html
http://lists.debian.org/debian-lts-announce/2019/04/msg00015.html
http://sourceforge.net/p/graphicsmagick/bugs/601/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Path traversal

EUVDB-ID: #VU26485

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-12921

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within TranslateTextEx component for processing SVG images in GraphicsMagick. A remote attacker can create a specially crafted SVG file and read contents of arbitrary files on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GraphicsMagick: 1.3.8 - 1.3.31

External links

http://www.graphicsmagick.org/
http://github.com/d0ge/data-processing/blob/master/CVE-2019-12921.md
http://lists.debian.org/debian-lts-announce/2020/03/msg00026.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###