SUSE update for ImageMagick



Published: 2021-04-20
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2021-20309
CVE-2021-20311
CVE-2021-20312
CVE-2021-20313
CWE-ID CWE-369
CWE-190
CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Module for Development Tools
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Desktop Applications
Operating systems & Components / Operating system

libMagickWand-7_Q16HDRI6-debuginfo
Operating systems & Components / Operating system package or component

libMagickWand-7_Q16HDRI6
Operating systems & Components / Operating system package or component

libMagickCore-7_Q16HDRI6-debuginfo
Operating systems & Components / Operating system package or component

libMagickCore-7_Q16HDRI6
Operating systems & Components / Operating system package or component

libMagick++-devel
Operating systems & Components / Operating system package or component

libMagick++-7_Q16HDRI4-debuginfo
Operating systems & Components / Operating system package or component

libMagick++-7_Q16HDRI4
Operating systems & Components / Operating system package or component

ImageMagick-devel
Operating systems & Components / Operating system package or component

ImageMagick-config-7-upstream
Operating systems & Components / Operating system package or component

ImageMagick-config-7-SUSE
Operating systems & Components / Operating system package or component

ImageMagick
Operating systems & Components / Operating system package or component

perl-PerlMagick-debuginfo
Operating systems & Components / Operating system package or component

perl-PerlMagick
Operating systems & Components / Operating system package or component

ImageMagick-debugsource
Operating systems & Components / Operating system package or component

ImageMagick-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Division by zero

EUVDB-ID: #VU62868

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-20309

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to a division by zero error in the WaveImage() function in MagickCore/visual-effects.c . A remote attacker can pass specially crafted image file to the application and crash it.

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3

libMagickWand-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickWand-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagick++-devel: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4-debuginfo: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4: before 7.0.7.34-10.15.1

ImageMagick-devel: before 7.0.7.34-10.15.1

ImageMagick-config-7-upstream: before 7.0.7.34-10.15.1

ImageMagick-config-7-SUSE: before 7.0.7.34-10.15.1

ImageMagick: before 7.0.7.34-10.15.1

perl-PerlMagick-debuginfo: before 7.0.7.34-10.15.1

perl-PerlMagick: before 7.0.7.34-10.15.1

ImageMagick-debugsource: before 7.0.7.34-10.15.1

ImageMagick-debuginfo: before 7.0.7.34-10.15.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20211276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Division by zero

EUVDB-ID: #VU62869

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-20311

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to a division by zero error in the sRGBTransformImage() function in MagickCore/colorspace.c . A remote attacker can pass specially crafted image file to the application and crash it.

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3

libMagickWand-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickWand-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagick++-devel: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4-debuginfo: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4: before 7.0.7.34-10.15.1

ImageMagick-devel: before 7.0.7.34-10.15.1

ImageMagick-config-7-upstream: before 7.0.7.34-10.15.1

ImageMagick-config-7-SUSE: before 7.0.7.34-10.15.1

ImageMagick: before 7.0.7.34-10.15.1

perl-PerlMagick-debuginfo: before 7.0.7.34-10.15.1

perl-PerlMagick: before 7.0.7.34-10.15.1

ImageMagick-debugsource: before 7.0.7.34-10.15.1

ImageMagick-debuginfo: before 7.0.7.34-10.15.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20211276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Integer overflow

EUVDB-ID: #VU62867

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-20312

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in the WriteTHUMBNAILImage() function in coders/thumbnail.c. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3

libMagickWand-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickWand-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagick++-devel: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4-debuginfo: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4: before 7.0.7.34-10.15.1

ImageMagick-devel: before 7.0.7.34-10.15.1

ImageMagick-config-7-upstream: before 7.0.7.34-10.15.1

ImageMagick-config-7-SUSE: before 7.0.7.34-10.15.1

ImageMagick: before 7.0.7.34-10.15.1

perl-PerlMagick-debuginfo: before 7.0.7.34-10.15.1

perl-PerlMagick: before 7.0.7.34-10.15.1

ImageMagick-debugsource: before 7.0.7.34-10.15.1

ImageMagick-debuginfo: before 7.0.7.34-10.15.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20211276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information disclosure

EUVDB-ID: #VU62861

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-20313

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to potential cipher leak when calculating signatures in TransformSignature() function in MagickCore/signature.c. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected package ImageMagick to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Module for Development Tools: 15-SP2 - 15-SP3

SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3

libMagickWand-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickWand-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6-debuginfo: before 7.0.7.34-10.15.1

libMagickCore-7_Q16HDRI6: before 7.0.7.34-10.15.1

libMagick++-devel: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4-debuginfo: before 7.0.7.34-10.15.1

libMagick++-7_Q16HDRI4: before 7.0.7.34-10.15.1

ImageMagick-devel: before 7.0.7.34-10.15.1

ImageMagick-config-7-upstream: before 7.0.7.34-10.15.1

ImageMagick-config-7-SUSE: before 7.0.7.34-10.15.1

ImageMagick: before 7.0.7.34-10.15.1

perl-PerlMagick-debuginfo: before 7.0.7.34-10.15.1

perl-PerlMagick: before 7.0.7.34-10.15.1

ImageMagick-debugsource: before 7.0.7.34-10.15.1

ImageMagick-debuginfo: before 7.0.7.34-10.15.1

External links

http://www.suse.com/support/update/announcement/2021/suse-su-20211276-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###