New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 5.9
SynopsisThe remote Debian host is missing a security update.
DescriptionSeveral vulnerabilities have been found in the graphicsmagick package that may lead to denial of service through failed assertions, CPU or memory usage. Some vulnerabilities may also lead to code execution but no exploit is currently known.
Utah RLE: Reject truncated/absurd files which caused huge memory allocations and/or consumed huge CPU
missing check that the provided colormap is not larger than 256 entries resulting in potential heap overflow
denial of service via a crash due to an assertion
stack-based buffer overflow in ReadSCTImage (sct.c)
memory allocation failure in ReadPCXImage (pcx.c)
memory allocation failure in MagickMalloc (memory.c)
For Debian 7 'Wheezy', these problems have been fixed in version 1.3.16-1.1+deb7u5.
We recommend that you upgrade your graphicsmagick packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpgrade the affected packages.