SUSE SLED12 / SLES12 Security Update : ImageMagick (SUSE-SU-2016:1784-1)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

ImageMagick was updated to fix 66 security issues.

These security issues were fixed :

- CVE-2014-9810: SEGV in dpx file handler. (bsc#983803).

- CVE-2014-9811: Crash in xwd file handler (bsc#984032).

- CVE-2014-9812: NULL pointer dereference in ps file
handling (bsc#984137).

- CVE-2014-9813: Crash on corrupted viff file
(bsc#984035).

- CVE-2014-9814: NULL pointer dereference in wpg file
handling (bsc#984193).

- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).

- CVE-2014-9816: Out of bound access in viff image
(bsc#984398).

- CVE-2014-9817: Heap buffer overflow in pdb file handling
(bsc#984400).

- CVE-2014-9818: Out of bound access on malformed sun file
(bsc#984181).

- CVE-2014-9819: Heap overflow in palm files (bsc#984142).

- CVE-2014-9830: Handling of corrupted sun file
(bsc#984135).

- CVE-2014-9831: Handling of corrupted wpg file
(bsc#984375).

- CVE-2014-9850: Incorrect thread limit logic
(bsc#984149).

- CVE-2014-9851: Crash when parsing resource block
(bsc#984160).

- CVE-2014-9852: Incorrect usage of object after it has
been destroyed (bsc#984191).

- CVE-2014-9853: Memory leak in rle file handling
(bsc#984408).

- CVE-2015-8902: PDB file DoS (CPU consumption)
(bsc#983253).

- CVE-2015-8903: Denial of service (cpu) in vicar
(bsc#983259).

- CVE-2015-8900: HDR file DoS (endless loop) (bsc#983232).

- CVE-2015-8901: MIFF file DoS (endless loop)
(bsc#983234).

- CVE-2016-5688: Various invalid memory reads in
ImageMagick WPG (bsc#985442).

- CVE-2014-9834: Heap overflow in pict file (bsc#984436).

- CVE-2014-9806: Prevent leak of file descriptor due to
corrupted file. (bsc#983774).

- CVE-2016-5687: Out of bounds read in DDS coder
(bsc#985448).

- CVE-2014-9838: Out of memory crash in magick/cache.c
(bsc#984370).

- CVE-2014-9854: Filling memory during identification of
TIFF image (bsc#984184).

- CVE-2015-8898: Prevent NULL pointer access in
magick/constitute.c (bsc#983746).

- CVE-2014-9833: Heap overflow in psd file (bsc#984406).

- CVE-2015-8894: Double free in coders/tga.c:221
(bsc#983523).

- CVE-2015-8895: Integer and Buffer overflow in
coders/icon.c (bsc#983527).

- CVE-2015-8896: Double free / integer truncation issue in
coders/pict.c:2000 (bsc#983533).

- CVE-2015-8897: Out of bounds error in SpliceImage
(bsc#983739).

- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).

- CVE-2016-5691: Checks for pixel.red/green/blue in dcm
coder (bsc#985456).

- CVE-2014-9836: Crash in xpm file handling (bsc#984023).

- CVE-2014-9808: SEGV due to corrupted dpc images.
(bsc#983796).

- CVE-2014-9821: Avoid heap overflow in pnm files.
(bsc#984014).

- CVE-2014-9820: Heap overflow in xpm files (bsc#984150).

- CVE-2014-9823: Heap overflow in palm file (bsc#984401).

- CVE-2014-9822: Heap overflow in quantum file
(bsc#984187).

- CVE-2014-9825: Heap overflow in corrupted psd file
(bsc#984427).

- CVE-2014-9824: Heap overflow in psd file (bsc#984185).

- CVE-2014-9809: SEGV due to corrupted xwd images.
(bsc#983799).

- CVE-2014-9826: Incorrect error handling in sun files
(bsc#984186).

- CVE-2014-9843: Incorrect boundary checks in
DecodePSDPixels (bsc#984179).

- CVE-2014-9842: Memory leak in psd handling (bsc#984374).

- CVE-2014-9841: Throwing of exceptions in psd handling
(bsc#984172).

- CVE-2014-9840: Out of bound access in palm file
(bsc#984433).

- CVE-2014-9847: Incorrect handling of 'previous' image in
the JNG decoder (bsc#984144).

- CVE-2014-9846: Added checks to prevent overflow in rle
file. (bsc#983521).

- CVE-2014-9845: Crash due to corrupted dib file
(bsc#984394).

- CVE-2014-9844: Out of bound issue in rle file
(bsc#984373).

- CVE-2014-9849: Crash in png coder (bsc#984018).

- CVE-2014-9848: Memory leak in quantum management
(bsc#984404).

- CVE-2014-9807: Double free in pdb coder. (bsc#983794).

- CVE-2014-9829: Out of bound access in sun file
(bsc#984409).

- CVE-2014-9832: Heap overflow in pcx file (bsc#984183).

- CVE-2014-9805: SEGV due to a corrupted pnm file.
(bsc#983752).

- CVE-2016-4564: The DrawImage function in
MagickCore/draw.c in ImageMagick made an incorrect
function call in attempting to locate the next token,
which allowed remote attackers to cause a denial of
service (buffer overflow and application crash) or
possibly have unspecified other impact via a crafted
file (bsc#983308).

- CVE-2016-4563: The TraceStrokePolygon function in
MagickCore/draw.c in ImageMagick mishandled the
relationship between the BezierQuantum value and certain
strokes data, which allowed remote attackers to cause a
denial of service (buffer overflow and application
crash) or possibly have unspecified other impact via a
crafted file (bsc#983305).

- CVE-2016-4562: The DrawDashPolygon function in
MagickCore/draw.c in ImageMagick mishandled calculations
of certain vertices integer data, which allowed remote
attackers to cause a denial of service (buffer overflow
and application crash) or possibly have unspecified
other impact via a crafted file (bsc#983292).

- CVE-2014-9839: Theoretical out of bound access in
magick/colormap-private.h (bsc#984379).

- CVE-2016-5689: NULL ptr dereference in dcm coder
(bsc#985460).

- CVE-2014-9837: Additional PNM sanity checks
(bsc#984166).

- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).

- CVE-2014-9828: Corrupted (too many colors) psd file
(bsc#984028).

- CVE-2016-5841: Integer overflow could have read to RCE
(bnc#986609).

- CVE-2016-5842: Out-of-bounds read in
MagickCore/property.c:1396 could have lead to memory
leak (bnc#986608).

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/983232
https://bugzilla.suse.com/983234
https://bugzilla.suse.com/983253
https://bugzilla.suse.com/983259
https://bugzilla.suse.com/983292
https://bugzilla.suse.com/983305
https://bugzilla.suse.com/983308
https://bugzilla.suse.com/983521
https://bugzilla.suse.com/983523
https://bugzilla.suse.com/983527
https://bugzilla.suse.com/983533
https://bugzilla.suse.com/983739
https://bugzilla.suse.com/983746
https://bugzilla.suse.com/983752
https://bugzilla.suse.com/983774
https://bugzilla.suse.com/983794
https://bugzilla.suse.com/983796
https://bugzilla.suse.com/983799
https://bugzilla.suse.com/983803
https://bugzilla.suse.com/984014
https://bugzilla.suse.com/984018
https://bugzilla.suse.com/984023
https://bugzilla.suse.com/984028
https://bugzilla.suse.com/984032
https://bugzilla.suse.com/984035
https://bugzilla.suse.com/984135
https://bugzilla.suse.com/984137
https://bugzilla.suse.com/984142
https://bugzilla.suse.com/984144
https://bugzilla.suse.com/984145
https://bugzilla.suse.com/984149
https://bugzilla.suse.com/984150
https://bugzilla.suse.com/984160
https://bugzilla.suse.com/984166
https://bugzilla.suse.com/984172
https://bugzilla.suse.com/984179
https://bugzilla.suse.com/984181
https://bugzilla.suse.com/984183
https://bugzilla.suse.com/984184
https://bugzilla.suse.com/984185
https://bugzilla.suse.com/984186
https://bugzilla.suse.com/984187
https://bugzilla.suse.com/984191
https://bugzilla.suse.com/984193
https://bugzilla.suse.com/984370
https://bugzilla.suse.com/984372
https://bugzilla.suse.com/984373
https://bugzilla.suse.com/984374
https://bugzilla.suse.com/984375
https://bugzilla.suse.com/984379
https://bugzilla.suse.com/984394
https://bugzilla.suse.com/984398
https://bugzilla.suse.com/984400
https://bugzilla.suse.com/984401
https://bugzilla.suse.com/984404
https://bugzilla.suse.com/984406
https://bugzilla.suse.com/984408
https://bugzilla.suse.com/984409
https://bugzilla.suse.com/984427
https://bugzilla.suse.com/984433
https://bugzilla.suse.com/984436
https://bugzilla.suse.com/985442
https://bugzilla.suse.com/985448
https://bugzilla.suse.com/985451
https://bugzilla.suse.com/985456
https://bugzilla.suse.com/985460
https://bugzilla.suse.com/986608
https://bugzilla.suse.com/986609
https://www.suse.com/security/cve/CVE-2014-9805.html
https://www.suse.com/security/cve/CVE-2014-9806.html
https://www.suse.com/security/cve/CVE-2014-9807.html
https://www.suse.com/security/cve/CVE-2014-9808.html
https://www.suse.com/security/cve/CVE-2014-9809.html
https://www.suse.com/security/cve/CVE-2014-9810.html
https://www.suse.com/security/cve/CVE-2014-9811.html
https://www.suse.com/security/cve/CVE-2014-9812.html
https://www.suse.com/security/cve/CVE-2014-9813.html
https://www.suse.com/security/cve/CVE-2014-9814.html
https://www.suse.com/security/cve/CVE-2014-9815.html
https://www.suse.com/security/cve/CVE-2014-9816.html
https://www.suse.com/security/cve/CVE-2014-9817.html
https://www.suse.com/security/cve/CVE-2014-9818.html
https://www.suse.com/security/cve/CVE-2014-9819.html
https://www.suse.com/security/cve/CVE-2014-9820.html
https://www.suse.com/security/cve/CVE-2014-9821.html
https://www.suse.com/security/cve/CVE-2014-9822.html
https://www.suse.com/security/cve/CVE-2014-9823.html
https://www.suse.com/security/cve/CVE-2014-9824.html
https://www.suse.com/security/cve/CVE-2014-9825.html
https://www.suse.com/security/cve/CVE-2014-9826.html
https://www.suse.com/security/cve/CVE-2014-9828.html
https://www.suse.com/security/cve/CVE-2014-9829.html
https://www.suse.com/security/cve/CVE-2014-9830.html
https://www.suse.com/security/cve/CVE-2014-9831.html
https://www.suse.com/security/cve/CVE-2014-9832.html
https://www.suse.com/security/cve/CVE-2014-9833.html
https://www.suse.com/security/cve/CVE-2014-9834.html
https://www.suse.com/security/cve/CVE-2014-9835.html
https://www.suse.com/security/cve/CVE-2014-9836.html
https://www.suse.com/security/cve/CVE-2014-9837.html
https://www.suse.com/security/cve/CVE-2014-9838.html
https://www.suse.com/security/cve/CVE-2014-9839.html
https://www.suse.com/security/cve/CVE-2014-9840.html
https://www.suse.com/security/cve/CVE-2014-9841.html
https://www.suse.com/security/cve/CVE-2014-9842.html
https://www.suse.com/security/cve/CVE-2014-9843.html
https://www.suse.com/security/cve/CVE-2014-9844.html
https://www.suse.com/security/cve/CVE-2014-9845.html
https://www.suse.com/security/cve/CVE-2014-9846.html
https://www.suse.com/security/cve/CVE-2014-9847.html
https://www.suse.com/security/cve/CVE-2014-9848.html
https://www.suse.com/security/cve/CVE-2014-9849.html
https://www.suse.com/security/cve/CVE-2014-9850.html
https://www.suse.com/security/cve/CVE-2014-9851.html
https://www.suse.com/security/cve/CVE-2014-9852.html
https://www.suse.com/security/cve/CVE-2014-9853.html
https://www.suse.com/security/cve/CVE-2014-9854.html
https://www.suse.com/security/cve/CVE-2015-8894.html
https://www.suse.com/security/cve/CVE-2015-8895.html
https://www.suse.com/security/cve/CVE-2015-8896.html
https://www.suse.com/security/cve/CVE-2015-8897.html
https://www.suse.com/security/cve/CVE-2015-8898.html
https://www.suse.com/security/cve/CVE-2015-8900.html
https://www.suse.com/security/cve/CVE-2015-8901.html
https://www.suse.com/security/cve/CVE-2015-8902.html
https://www.suse.com/security/cve/CVE-2015-8903.html
https://www.suse.com/security/cve/CVE-2016-4562.html
https://www.suse.com/security/cve/CVE-2016-4563.html
https://www.suse.com/security/cve/CVE-2016-4564.html
https://www.suse.com/security/cve/CVE-2016-5687.html
https://www.suse.com/security/cve/CVE-2016-5688.html
https://www.suse.com/security/cve/CVE-2016-5689.html
https://www.suse.com/security/cve/CVE-2016-5690.html
https://www.suse.com/security/cve/CVE-2016-5691.html
https://www.suse.com/security/cve/CVE-2016-5841.html
https://www.suse.com/security/cve/CVE-2016-5842.html
http://www.nessus.org/u?b47a63ca

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Workstation Extension 12-SP1 :

zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1041=1

SUSE Linux Enterprise Software Development Kit 12-SP1 :

zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1041=1

SUSE Linux Enterprise Server 12-SP1 :

zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1041=1

SUSE Linux Enterprise Desktop 12-SP1 :

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1041=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true