-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1955
                  ImageMagick -- multiple vulnerabilities
                                31 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ImageMagick
Publisher:         FreeBSD
Operating System:  FreeBSD
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11598 CVE-2019-11597 CVE-2019-11472
                   CVE-2019-11470 CVE-2019-10714 CVE-2019-10650
                   CVE-2019-10649 CVE-2019-10131 CVE-2019-9956
                   CVE-2019-7398 CVE-2019-7397 CVE-2019-7396
                   CVE-2019-7395 CVE-2019-7175 

Reference:         ESB-2019.1701
                   ESB-2019.1667
                   ESB-2019.1448
                   ESB-2019.1404

Original Bulletin: 
   http://www.vuxml.org/freebsd/183d700e-ec70-487e-a9c4-632324afa934.html

- --------------------------BEGIN INCLUDED TEXT--------------------

FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports
Collection

ImageMagick -- multiple vulnerabilities

Affected packages
  ImageMagick7       < 7.0.8.47
  ImageMagick7-nox11 < 7.0.8.47
  ImageMagick        < 6.9.10.47
  ImageMagick-nox11  < 6.9.10.47

Details

VuXML ID  183d700e-ec70-487e-a9c4-632324afa934
Discovery 2019-03-07
Entry     2019-05-30

cvedetails.com reports:

    CVE-2019-7175: In ImageMagick before 7.0.8-25, some memory leaks exist in
    DecodeImage in coders/pcd.c.

    CVE-2019-7395: In ImageMagick before 7.0.8-25, a memory leak exists in
    WritePSDChannel in coders/psd.c.

    CVE-2019-7396: In ImageMagick before 7.0.8-25, a memory leak exists in
    ReadSIXELImage in coders/sixel.c.

    CVE-2019-7397: In ImageMagick before 7.0.8-25 and GraphicsMagick through
    1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.

    CVE-2019-7398: In ImageMagick before 7.0.8-25, a memory leak exists in
    WriteDIBImage in coders/dib.c.

    CVE-2019-9956: In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer
    overflow in the function PopHexPixel of coders/ps.c, which allows an
    attacker to cause a denial of service or code execution via a crafted image
    file.

    CVE-2019-10131: An off-by-one read vulnerability was discovered in
    ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in
    coders/meta.c. A local attacker may use this flaw to read beyond the end of
    the buffer or to crash the program.

    CVE-2019-10649: In ImageMagick 7.0.8-36 Q16, there is a memory leak in the
    function SVGKeyValuePairs of coders/svg.c, which allows an attacker to
    cause a denial of service via a crafted image file.

    CVE-2019-10650: In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer
    over-read in the function WriteTIFFImage of coders/tiff.c, which allows an
    attacker to cause a denial of service or information disclosure via a
    crafted image file.

    CVE-2019-10714: LocaleLowercase in MagickCore/locale.c in ImageMagick
    before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.

    CVE-2019-11470: The cineon parsing component in ImageMagick 7.0.8-26 Q16
    allows attackers to cause a denial-of-service (uncontrolled resource
    consumption) by crafting a Cineon image with an incorrect claimed image
    size. This occurs because ReadCINImage in coders/cin.c lacks a check for
    insufficient image data in a file.

    CVE-2019-11472: ReadXWDImage in coders/xwd.c in the XWD image parsing
    component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a
    denial-of-service (divide-by-zero error) by crafting an XWD image file in
    which the header indicates neither LSB first nor MSB first.

    CVE-2019-11597: In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer
    over-read in the function WriteTIFFImage of coders/tiff.c, which allows an
    attacker to cause a denial of service or possibly information disclosure
    via a crafted image file.

    CVE-2019-11598: In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer
    over-read in the function WritePNMImage of coders/pnm.c, which allows an
    attacker to cause a denial of service or possibly information disclosure
    via a crafted image file. This is related to SetGrayscaleImage in
    MagickCore/quantize.c.

    [source]

References

CVE     CVE-2019-10131
Name
CVE     CVE-2019-10649
Name
CVE     CVE-2019-10650
Name
CVE     CVE-2019-10714
Name
CVE     CVE-2019-11470
Name
CVE     CVE-2019-11472
Name
CVE     CVE-2019-11597
Name
CVE     CVE-2019-11598
Name
CVE     CVE-2019-7175
Name
CVE     CVE-2019-7395
Name
CVE     CVE-2019-7396
Name
CVE     CVE-2019-7397
Name
CVE     CVE-2019-7398
Name
CVE     CVE-2019-9956
Name
URL     https://www.cvedetails.com/vulnerability-list/vendor_id-1749/
        Imagemagick.html

- -------------------------------------------------------------------------------

Copyright (C) 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright information.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ojSD
-----END PGP SIGNATURE-----