openSUSE Security Update : GraphicsMagick (openSUSE-2018-166)

High Nessus Plugin ID 106861

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for GraphicsMagick fixes the following issues :

- The dcm coder was updated to newest code, covering all currently known security issues.

Security issues fixed :

- CVE-2017-17502: ReadCMYKImage in ImportCMYKQuantumType had a heap-based buffer over-read via a crafted file.
[boo#1073081]

- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed [boo#1049374]

- CVE-2017-11140: coders/jpeg.c allowed remote attackers to cause a denial of service (application crash).
[boo#1047900]

- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c could lead to denial of service or code execution. [boo#1058009]

- CVE-2017-17912: A heap-based buffer over-read in ReadNewsProfile in coders/tiff.c was fixed.
[boo#1074307]

- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. [boo#1076182]

- CVE-2017-11722: The WriteOnePNGImage function in coders/png.c allowed attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file, because the program's actual control flow was inconsistent with its indentation. This resulted in a logging statement executing outside of a loop, and consequently using an invalid array index corresponding to the loop's exit condition. (bsc#1051411)

Solution

Update the affected GraphicsMagick packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1047900

https://bugzilla.opensuse.org/show_bug.cgi?id=1049374

https://bugzilla.opensuse.org/show_bug.cgi?id=1051411

https://bugzilla.opensuse.org/show_bug.cgi?id=1058009

https://bugzilla.opensuse.org/show_bug.cgi?id=1073081

https://bugzilla.opensuse.org/show_bug.cgi?id=1074307

https://bugzilla.opensuse.org/show_bug.cgi?id=1076182

Plugin Details

Severity: High

ID: 106861

File Name: openSUSE-2018-166.nasl

Version: 3.2

Type: local

Agent: unix

Published: 2018/02/16

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:GraphicsMagick, p-cpe:/a:novell:opensuse:GraphicsMagick-debuginfo, p-cpe:/a:novell:opensuse:GraphicsMagick-debugsource, p-cpe:/a:novell:opensuse:GraphicsMagick-devel, p-cpe:/a:novell:opensuse:libGraphicsMagick++-Q16-12, p-cpe:/a:novell:opensuse:libGraphicsMagick++-Q16-12-debuginfo, p-cpe:/a:novell:opensuse:libGraphicsMagick++-devel, p-cpe:/a:novell:opensuse:libGraphicsMagick-Q16-3, p-cpe:/a:novell:opensuse:libGraphicsMagick-Q16-3-debuginfo, p-cpe:/a:novell:opensuse:libGraphicsMagick3-config, p-cpe:/a:novell:opensuse:libGraphicsMagickWand-Q16-2, p-cpe:/a:novell:opensuse:libGraphicsMagickWand-Q16-2-debuginfo, p-cpe:/a:novell:opensuse:perl-GraphicsMagick, p-cpe:/a:novell:opensuse:perl-GraphicsMagick-debuginfo, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2018/02/16

Reference Information

CVE: CVE-2017-11140, CVE-2017-11450, CVE-2017-11722, CVE-2017-14224, CVE-2017-17502, CVE-2017-17912, CVE-2017-18028