Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1828 GraphicsMagick -- multiple vulnerabilities 21 June 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: GraphicsMagick Publisher: FreeBSD Operating System: FreeBSD Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2017-10800 CVE-2017-10799 CVE-2017-10794 CVE-2017-8350 CVE-2017-6335 CVE-2016-9830 CVE-2016-7997 CVE-2016-7996 CVE-2016-7800 Reference: ASB-2017.0219 ESB-2018.0018 ESB-2017.1376 ESB-2017.1341 ESB-2017.0003 ESB-2016.2847 Original Bulletin: http://www.vuxml.org/freebsd/25f73c47-68a8-4a30-9cbc-1ca5eea4d6ba.html - --------------------------BEGIN INCLUDED TEXT-------------------- FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection GraphicsMagick -- multiple vulnerabilities Affected packages GraphicsMagick < 1.3.26,1 Details VuXML ID 25f73c47-68a8-4a30-9cbc-1ca5eea4d6ba Discovery 2017-07-04 Entry 2018-06-18 GraphicsMagick reports: Multiple vulnerabilities have been found in GraphicsMagick 1.3.26 or earlier. Please refer to the CVE list for details. References CVE Name CVE-2016-7800 CVE Name CVE-2016-7996 CVE Name CVE-2016-7997 CVE Name CVE-2016-9830 CVE Name CVE-2017-10794 CVE Name CVE-2017-10799 CVE Name CVE-2017-10800 CVE Name CVE-2017-6335 CVE Name CVE-2017-8350 URL http://www.graphicsmagick.org/NEWS.html - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWys3RmaOgq3Tt24GAQiP9RAAlQEXPJ1QNOzswAg0CQpKKR80XyWpzyxE 3Y5TEmDK5wFJ97OQX/MhpAk7qY9e++hj821fLD4ruzoD5OzgJFl4YYt/hPtKosiQ dKHGA7GQn7OrZlMGjXSw1VKd2vVjgeRR3Ii/HfGLILEZuVaoacqJgnON03B/605Q GcWP5MZg4v5nujqlqjeE7Atq6S28ylPQgtLSTi6floDcCHvQgG3qycSEQ6a0AhBM MYxkuSLS0japbpsCIQywFRl1k/XeIas7tzvA6zohAgTBPHXT10aY8rCHZEg5juan uAnog6bhnhCfJSsTFomCg0ARqg5goXtE4boUOkjZ5/DE0v+8fm9RqEMNv9RX9JEy b48ad+YxmaBPw0Gl+j/LPxexTab35LmHjV+iCtxh9epS2Q8n3nldGUTTtQiMvr66 SOrNfIJDM/Jtn32TaGLvaVzS3jKeqXoCe9WPLbblE5QvW79Gf7TX1f8Pg1SRHIYX FZQFSwVZ2ZU9AZEJlw6yU+z3jIqGRECnF+8MyvtEGNaUYgduAbiRFw+wK1QEpaFP RHlwPhzRrJcnwCyqjAfTadMGXDyDmpn937r+CEl+puCtn5//sHk/JIpm0tKK1u5f BBeRiVntcQuNUJHihYnydNmCpEfwrGgOBySC7ZhEf+tY3elPj4Q3fLVGDsaVoNQk 7pWzMH899/E= =fVnI -----END PGP SIGNATURE-----