openSUSE Security Update : ImageMagick (openSUSE-2017-303)

critical Nessus Plugin ID 97562

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for ImageMagick fixes the following issues :

- CVE-2016-10046: Prevent buffer overflow in draw.c caused by an incorrect length calculation (bsc#1017308)

- CVE-2016-10048: Arbitrary module could have been load because relative path were not escaped (bsc#1017310)

- CVE-2016-10049: Corrupt RLE files could have overflowed a buffer due to a incorrect length calculation (bsc#1017311)

- CVE-2016-10050: Corrupt RLE files could have overflowed a heap buffer due to a missing offset check (bsc#1017312)

- CVE-2016-10051: Fixed use after free when reading PWP files (bsc#1017313)

- CVE-2016-10052: Added bound check to exif parsing of JPEG files (bsc#1017314)

- CVE-2016-10059: Unchecked calculation when reading TIFF files could have lead to a buffer overflow (bsc#1017318)

- CVE-2016-10060: Improved error handling when writing files to not mask errors (bsc#1017319)

- CVE-2016-10061: Improved error handling when writing files to not mask errors (bsc#1017319).

- CVE-2016-10062: Improved error handling when writing files to not mask errors (bsc#1017319).

- CVE-2016-10063: Check validity of extend during TIFF file reading (bsc#1017320)

- CVE-2016-10064: Improved checks for buffer overflow when reading TIFF files (bsc#1017321)

- CVE-2016-10065: Unchecked calculations when reading VIFF files could have lead to out of bound reads (bsc#1017322)

- CVE-2016-10068: Prevent NULL pointer access when using the MSL interpreter (bsc#1017324)

- CVE-2016-10069: Add check for invalid mat file (bsc#1017325).

- CVE-2016-10070: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)

- CVE-2016-10071: Prevent allocating the wrong amount of memory when reading mat files (bsc#1017326)

- CVE-2016-10144: Added a check after allocating memory when parsing IPL files (bsc#1020433)

- CVE-2016-10145: Fixed of-by-one in string copy operation when parsing WPG files (bsc#1020435)

- CVE-2016-10146: Captions and labels were handled incorrectly, causing a memory leak that could have lead to DoS (bsc#1020443)

- CVE-2017-5506: Missing offset check leading to a double-free (bsc#1020436)

- CVE-2017-5507: Fixed a memory leak when reading MPC files allowing for DoS (bsc#1020439)

- CVE-2017-5508: Increase the amount of memory allocated for TIFF pixels to prevent a heap buffer-overflow (bsc#1020441)

- CVE-2017-5510: Prevent out-of-bounds write when reading PSD files (bsc#1020446).

- CVE-2017-5511: A missing cast when reading PSD files could have caused memory corruption by a heap overflow (bsc#1020448)

This update removes the fix for CVE-2016-9773. ImageMagick-6 was not affected by CVE-2016-9773 and it caused a regression (at least in GraphicsMagick) (bsc#1017421).

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected ImageMagick packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1017310

https://bugzilla.opensuse.org/show_bug.cgi?id=1017312

https://bugzilla.opensuse.org/show_bug.cgi?id=1017313

https://bugzilla.opensuse.org/show_bug.cgi?id=1017314

https://bugzilla.opensuse.org/show_bug.cgi?id=1017318

https://bugzilla.opensuse.org/show_bug.cgi?id=1017321

https://bugzilla.opensuse.org/show_bug.cgi?id=1017322

https://bugzilla.opensuse.org/show_bug.cgi?id=1017324

https://bugzilla.opensuse.org/show_bug.cgi?id=1017325

https://bugzilla.opensuse.org/show_bug.cgi?id=1017326

https://bugzilla.opensuse.org/show_bug.cgi?id=1020443

https://bugzilla.opensuse.org/show_bug.cgi?id=1020448

https://bugzilla.opensuse.org/show_bug.cgi?id=1017308

https://bugzilla.opensuse.org/show_bug.cgi?id=1017311

https://bugzilla.opensuse.org/show_bug.cgi?id=1017319

https://bugzilla.opensuse.org/show_bug.cgi?id=1017320

https://bugzilla.opensuse.org/show_bug.cgi?id=1017421

https://bugzilla.opensuse.org/show_bug.cgi?id=1020433

https://bugzilla.opensuse.org/show_bug.cgi?id=1020435

https://bugzilla.opensuse.org/show_bug.cgi?id=1020436

https://bugzilla.opensuse.org/show_bug.cgi?id=1020439

https://bugzilla.opensuse.org/show_bug.cgi?id=1020441

https://bugzilla.opensuse.org/show_bug.cgi?id=1020446

Plugin Details

Severity: Critical

ID: 97562

File Name: openSUSE-2017-303.nasl

Version: 3.5

Type: local

Agent: unix

Published: 3/7/2017

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:42.1:*:*:*:*:*:*:*, cpe:2.3:o:novell:opensuse:42.2:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick-devel-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick-extra:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:imagemagick-extra-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickcore-6_q16-1:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickcore-6_q16-1-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickcore-6_q16-1-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickcore-6_q16-1-debuginfo-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickwand-6_q16-1:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickwand-6_q16-1-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickwand-6_q16-1-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagickwand-6_q16-1-debuginfo-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:perl-perlmagick:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:perl-perlmagick-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagick\+\+-6_q16-3:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagick\+\+-6_q16-3-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagick\+\+-6_q16-3-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagick\+\+-6_q16-3-debuginfo-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagick\+\+-devel:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libmagick\+\+-devel-32bit:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/2/2017

Reference Information

CVE: CVE-2016-9773, CVE-2016-10046, CVE-2016-10048, CVE-2016-10049, CVE-2016-10050, CVE-2016-10051, CVE-2016-10052, CVE-2016-10059, CVE-2016-10060, CVE-2016-10061, CVE-2016-10062, CVE-2016-10063, CVE-2016-10064, CVE-2016-10065, CVE-2016-10068, CVE-2016-10069, CVE-2016-10070, CVE-2016-10071, CVE-2016-10144, CVE-2016-10145, CVE-2016-10146, CVE-2017-5506, CVE-2017-5507, CVE-2017-5508, CVE-2017-5510, CVE-2017-5511