SUSE SLES11 Security Update : ImageMagick (SUSE-SU-2018:0486-1)

High Nessus Plugin ID 106926

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for ImageMagick fixes the following issues :

- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.
(bsc#1042824)

- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file. (bsc#1049375)

- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)

- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation. (bsc#1050048)

- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c. (bsc#1052207)

- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service. (bsc#1052254)

- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.
(bsc#1052761)

- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.
(bsc#1052750)

- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.
(bsc#1052747)

- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c.
(bsc#1052688)

- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file. (bsc#1055069)

- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c could lead to denial of service or code execution. (bsc#1058009)

- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)

- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)

- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer.
The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)

- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)

- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)

- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)

- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)

- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)

- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)

- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)

- CVE-2017-11637: A NULL pointer dereference in WritePCLImage() in coders/pcl.c was fixed which could lead to a crash (bsc#1050669)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t patch sdksp4-ImageMagick-13476=1

SUSE Linux Enterprise Server 11-SP4:zypper in -t patch slessp4-ImageMagick-13476=1

SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch dbgsp4-ImageMagick-13476=1

To bring your system up-to-date, use 'zypper patch'.

See Also

https://bugzilla.suse.com/1042824

https://bugzilla.suse.com/1048110

https://bugzilla.suse.com/1049374

https://bugzilla.suse.com/1049375

https://bugzilla.suse.com/1050048

https://bugzilla.suse.com/1050617

https://bugzilla.suse.com/1050669

https://bugzilla.suse.com/1052207

https://bugzilla.suse.com/1052248

https://bugzilla.suse.com/1052251

https://bugzilla.suse.com/1052254

https://bugzilla.suse.com/1052472

https://bugzilla.suse.com/1052688

https://bugzilla.suse.com/1052711

https://bugzilla.suse.com/1052747

https://bugzilla.suse.com/1052750

https://bugzilla.suse.com/1052761

https://bugzilla.suse.com/1055069

https://bugzilla.suse.com/1055229

https://bugzilla.suse.com/1058009

https://bugzilla.suse.com/1074119

https://bugzilla.suse.com/1076182

https://bugzilla.suse.com/1078433

https://www.suse.com/security/cve/CVE-2017-11166.html

https://www.suse.com/security/cve/CVE-2017-11448.html

https://www.suse.com/security/cve/CVE-2017-11450.html

https://www.suse.com/security/cve/CVE-2017-11537.html

https://www.suse.com/security/cve/CVE-2017-11637.html

https://www.suse.com/security/cve/CVE-2017-11638.html

https://www.suse.com/security/cve/CVE-2017-11642.html

https://www.suse.com/security/cve/CVE-2017-12418.html

https://www.suse.com/security/cve/CVE-2017-12427.html

https://www.suse.com/security/cve/CVE-2017-12429.html

https://www.suse.com/security/cve/CVE-2017-12432.html

https://www.suse.com/security/cve/CVE-2017-12566.html

https://www.suse.com/security/cve/CVE-2017-12654.html

https://www.suse.com/security/cve/CVE-2017-12664.html

https://www.suse.com/security/cve/CVE-2017-12665.html

https://www.suse.com/security/cve/CVE-2017-12668.html

https://www.suse.com/security/cve/CVE-2017-12674.html

https://www.suse.com/security/cve/CVE-2017-13058.html

https://www.suse.com/security/cve/CVE-2017-13131.html

https://www.suse.com/security/cve/CVE-2017-14224.html

https://www.suse.com/security/cve/CVE-2017-17885.html

https://www.suse.com/security/cve/CVE-2017-18028.html

https://www.suse.com/security/cve/CVE-2017-9407.html

https://www.suse.com/security/cve/CVE-2018-6405.html

http://www.nessus.org/u?9f0f13a2

Plugin Details

Severity: High

ID: 106926

File Name: suse_SU-2018-0486-1.nasl

Version: 3.2

Type: local

Agent: unix

Published: 2018/02/21

Modified: 2018/08/01

Dependencies: 12634

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libMagickCore1, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2018/02/20

Reference Information

CVE: CVE-2017-11166, CVE-2017-11448, CVE-2017-11450, CVE-2017-11537, CVE-2017-11637, CVE-2017-11638, CVE-2017-11642, CVE-2017-12418, CVE-2017-12427, CVE-2017-12429, CVE-2017-12432, CVE-2017-12566, CVE-2017-12654, CVE-2017-12664, CVE-2017-12665, CVE-2017-12668, CVE-2017-12674, CVE-2017-13058, CVE-2017-13131, CVE-2017-14224, CVE-2017-17885, CVE-2017-18028, CVE-2017-9407, CVE-2018-6405