Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0058 ImageMagick vulnerabilities patched in SUSE 12 5 January 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ImageMagick Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2017-15281 CVE-2017-15277 CVE-2017-14343 CVE-2017-14174 CVE-2017-14042 CVE-2017-13062 CVE-2017-13061 CVE-2017-12691 CVE-2017-12563 Original Bulletin: http://suse.com/support/update/announcement/2018/suse-su-20180017-1 Comment: This advisory references vulnerabilities in products which run on platforms other than SUSE. It is recommended that administrators running ImageMagick check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:0017-1 Rating: important References: #1052460 #1055053 #1055063 #1056550 #1057723 #1058422 #1063049 #1063050 Cross-References: CVE-2017-12563 CVE-2017-12691 CVE-2017-13061 CVE-2017-13062 CVE-2017-14042 CVE-2017-14174 CVE-2017-14343 CVE-2017-15277 CVE-2017-15281 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP3 SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Desktop 12-SP3 SUSE Linux Enterprise Desktop 12-SP2 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This update for ImageMagick fixes the following issues: - security update (xcf.c): * CVE-2017-14343: Memory leak vulnerability in ReadXCFImage could lead to denial of service via a crafted file. CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allows remote attackers to cause a denial of service (memory consumption) via a crafted file. [bsc#1058422] - security update (pnm.c): * CVE-2017-14042: A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c and could lead to remote denial of service [bsc#1056550] - security update (psd.c): * CVE-2017-15281: ReadPSDImage allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file [bsc#1063049] * CVE-2017-13061: A length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. [bsc#1055063] * CVE-2017-12563: A Memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service. [bsc#1052460] * CVE-2017-14174: Due to a lack of an EOF check (End of File) in ReadPSDLayersInternal could cause huge CPU consumption, when a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over \"length\" would consume huge CPU resources, since there is no EOF check inside the loop.[bsc#1057723] - security update (meta.c): * CVE-2017-13062: Amemory leak vulnerability was found in the function formatIPTC in coders/meta.c, which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file [bsc#1055053] - security update (gif.c): * CVE-2017-15277: ReadGIFImage in coders/gif.c leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.[bsc#1063050] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP3: zypper in -t patch SUSE-SLE-WE-12-SP3-2018-14=1 - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2018-14=1 - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-14=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-14=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2018-14=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-14=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-14=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-14=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-14=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64): ImageMagick-6.8.8.1-71.20.1 ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagick++-6_Q16-3-6.8.8.1-71.20.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.20.1 - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): ImageMagick-6.8.8.1-71.20.1 ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagick++-6_Q16-3-6.8.8.1-71.20.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.20.1 - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64): ImageMagick-6.8.8.1-71.20.1 ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 ImageMagick-devel-6.8.8.1-71.20.1 libMagick++-6_Q16-3-6.8.8.1-71.20.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.20.1 libMagick++-devel-6.8.8.1-71.20.1 perl-PerlMagick-6.8.8.1-71.20.1 perl-PerlMagick-debuginfo-6.8.8.1-71.20.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): ImageMagick-6.8.8.1-71.20.1 ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 ImageMagick-devel-6.8.8.1-71.20.1 libMagick++-6_Q16-3-6.8.8.1-71.20.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.20.1 libMagick++-devel-6.8.8.1-71.20.1 perl-PerlMagick-6.8.8.1-71.20.1 perl-PerlMagick-debuginfo-6.8.8.1-71.20.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.20.1 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.20.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64): ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.20.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): ImageMagick-6.8.8.1-71.20.1 ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagick++-6_Q16-3-6.8.8.1-71.20.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.20.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): ImageMagick-6.8.8.1-71.20.1 ImageMagick-debuginfo-6.8.8.1-71.20.1 ImageMagick-debugsource-6.8.8.1-71.20.1 libMagick++-6_Q16-3-6.8.8.1-71.20.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.20.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-6.8.8.1-71.20.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.20.1 References: https://www.suse.com/security/cve/CVE-2017-12563.html https://www.suse.com/security/cve/CVE-2017-12691.html https://www.suse.com/security/cve/CVE-2017-13061.html https://www.suse.com/security/cve/CVE-2017-13062.html https://www.suse.com/security/cve/CVE-2017-14042.html https://www.suse.com/security/cve/CVE-2017-14174.html https://www.suse.com/security/cve/CVE-2017-14343.html https://www.suse.com/security/cve/CVE-2017-15277.html https://www.suse.com/security/cve/CVE-2017-15281.html https://bugzilla.suse.com/1052460 https://bugzilla.suse.com/1055053 https://bugzilla.suse.com/1055063 https://bugzilla.suse.com/1056550 https://bugzilla.suse.com/1057723 https://bugzilla.suse.com/1058422 https://bugzilla.suse.com/1063049 https://bugzilla.suse.com/1063050 - -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWk7GgYx+lLeg9Ub1AQiHNxAAnA6e9jvWp0QRzuTqZ+ESVy//XWUO63En Vh0cgXdLgPR0zRocrq1Up36VI7AzKIAiAOU16pSq3T1R0beRP70j6mN9j54WrhMp c270ADegdOCBW//Tm/T7MGbWeYsg7f+5Pbnkgo3gRngZqX1PYiwJDxZ9PlnKZifw YBSkFymeDwcmxjQ1/mcSvGSqHHc6mA7E9LToeLHgw735ZTVcZ+sGzNFn8o27IhHI MMvKBjxs3sO8zh0w0XleimsD2qkZ9Q3Sl952EFX6/JYJjeRVx8GhQd6LXP5k13o+ BDSoSHVJQut+8uzLnTQVA2E37YlcbZIFwAvCtMd+cSqpn69AkaIQQzae2BwzXwqh NKiAPD4w+vBRfwHnvbsz0ChD45SAObm5R7MnPq3IRcWK2McC1ks8uoH0Ygn0YzfM +SszL6NF8Kg0V0f2ku/kKV6UsZcobReC5ZxyOGRbBz5ZhziEidWeOjwP4XEqCtat wHi6/1T1EtazZUq+0kvOmq4afDj/WwpIvCoHwdS6EXjoLKs2e9LuGlwklZloolzx qFukmcKa9fh0ByU/5eosVrr0HrzsO5BHE+wCtaG1PjjJHHG3zg8v0EvwjY5N7Qt2 MnJrki9Yzl+oGGKTuY+IOOZcYOYaHnICSE0ZaZrur+qK2Af9Kw7eAxVLOqY5V3dt nYUzFQBYMSI= =XM01 -----END PGP SIGNATURE-----