Debian DSA-3591-1 : imagemagick - security update

critical Nessus Plugin ID 91430
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 6.7

Synopsis

The remote Debian host is missing a security-related update.

Description

Bob Friesenhahn from the GraphicsMagick project discovered a command injection vulnerability in ImageMagick, a program suite for image manipulation. An attacker with control on input image or the input filename can execute arbitrary commands with the privileges of the user running the application.

This update removes the possibility of using pipe (|) in filenames to interact with imagemagick.

It is important that you upgrade the libmagickcore-6.q16-2 and not just the imagemagick package. Applications using libmagickcore-6.q16-2 might also be affected and need to be restarted after the upgrade.

Solution

Upgrade the imagemagick packages.

For the stable distribution (jessie), this problem has been fixed in version 8:6.8.9.9-5+deb8u3.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=825799

https://packages.debian.org/source/jessie/imagemagick

https://www.debian.org/security/2016/dsa-3591

Plugin Details

Severity: Critical

ID: 91430

File Name: debian_DSA-3591.nasl

Version: 2.9

Type: local

Agent: unix

Published: 6/2/2016

Updated: 1/11/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Critical

VPR Score: 6.7

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:imagemagick, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 6/1/2016

Reference Information

CVE: CVE-2016-5118

DSA: 3591