ImageMagick 6.x < 6.9.4-5 / 7.x < 7.0.1-7 Multiple DoS

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote Windows host is affected by
multiple denial of service vulnerabilities.

Description :

The version of ImageMagick installed on the remote Windows host is 6.x
prior to 6.9.4-5 or 7.x prior to 7.0.1-7. It is, therefore, affected
by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists in the DCM
reader due to a NULL pointer dereference flaw that is
triggered during the handling of photometric
interpretation or the handling of frames. An
unauthenticated, remote attacker can exploit this to
crash processes linked against the library.
(CVE-2016-5689)

- A denial of service vulnerability exists in the DCM
reader due to improper computation of the pixel scaling
table. An unauthenticated, remote attacker can exploit
this to crash processes linked against the library.
(CVE-2016-5690)

- A denial of service vulnerability exists in the DCM
reader due to improper validation of pixel.red,
pixel,green, and pixel.blue. An unauthenticated, remote
attacker can exploit this to crash processes linked
against the library. (CVE-2016-5691)

- Multiple denial of service vulnerabilities exist in
multiple functions in viff.c due to improper handling of
a saturation of exceptions. An unauthenticated, remote
attacker can exploit these issues to crash processes
linked against the library. (CVE-2016-10066,
CVE-2016-10067)

- A denial of service vulnerability exists in the
ThrowReaderException() function in mat.c due to improper
handling of frame numbers in a crafted MAT file. An
unauthenticated, remote attacker can exploit this to
crash processes linked against the library.
(CVE-2016-10069)

See also :

http://www.imagemagick.org/script/changelog.php
http://www.nessus.org/u?0b5f3426

Solution :

Upgrade to ImageMagick version 6.9.4-5 / 7.0.1-7 or later.

Note that you may need to manually uninstall the vulnerable version
from the system.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 91819 ()

Bugtraq ID: 91283

CVE ID: CVE-2016-5689
CVE-2016-5690
CVE-2016-5691
CVE-2016-10066
CVE-2016-10067
CVE-2016-10069

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now