Debian DLA-683-1 : graphicsmagick security update
High Nessus Plugin ID 94297
SynopsisThe remote Debian host is missing a security update.
DescriptionSeveral vulnerabilities have been found in the graphicsmagick package that may lead to denial of service through failed assertions, CPU or memory usage. Some vulnerabilities may also lead to code execution but no exploit is currently known.
Utah RLE: Reject truncated/absurd files which caused huge memory allocations and/or consumed huge CPU
missing check that the provided colormap is not larger than 256 entries resulting in potential heap overflow
denial of service via a crash due to an assertion
stack-based buffer overflow in ReadSCTImage (sct.c)
memory allocation failure in ReadPCXImage (pcx.c)
memory allocation failure in MagickMalloc (memory.c)
For Debian 7 'Wheezy', these problems have been fixed in version 1.3.16-1.1+deb7u5.
We recommend that you upgrade your graphicsmagick packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpgrade the affected packages.