Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1955 ImageMagick -- multiple vulnerabilities 31 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ImageMagick Publisher: FreeBSD Operating System: FreeBSD Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-11598 CVE-2019-11597 CVE-2019-11472 CVE-2019-11470 CVE-2019-10714 CVE-2019-10650 CVE-2019-10649 CVE-2019-10131 CVE-2019-9956 CVE-2019-7398 CVE-2019-7397 CVE-2019-7396 CVE-2019-7395 CVE-2019-7175 Reference: ESB-2019.1701 ESB-2019.1667 ESB-2019.1448 ESB-2019.1404 Original Bulletin: http://www.vuxml.org/freebsd/183d700e-ec70-487e-a9c4-632324afa934.html - --------------------------BEGIN INCLUDED TEXT-------------------- FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection ImageMagick -- multiple vulnerabilities Affected packages ImageMagick7 < 7.0.8.47 ImageMagick7-nox11 < 7.0.8.47 ImageMagick < 6.9.10.47 ImageMagick-nox11 < 6.9.10.47 Details VuXML ID 183d700e-ec70-487e-a9c4-632324afa934 Discovery 2019-03-07 Entry 2019-05-30 cvedetails.com reports: CVE-2019-7175: In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. CVE-2019-7395: In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. CVE-2019-7396: In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c. CVE-2019-7397: In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. CVE-2019-7398: In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c. CVE-2019-9956: In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file. CVE-2019-10131: An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program. CVE-2019-10649: In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file. CVE-2019-10650: In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file. CVE-2019-10714: LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. CVE-2019-11470: The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. CVE-2019-11472: ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. CVE-2019-11597: In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. CVE-2019-11598: In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. [source] References CVE CVE-2019-10131 Name CVE CVE-2019-10649 Name CVE CVE-2019-10650 Name CVE CVE-2019-10714 Name CVE CVE-2019-11470 Name CVE CVE-2019-11472 Name CVE CVE-2019-11597 Name CVE CVE-2019-11598 Name CVE CVE-2019-7175 Name CVE CVE-2019-7395 Name CVE CVE-2019-7396 Name CVE CVE-2019-7397 Name CVE CVE-2019-7398 Name CVE CVE-2019-9956 Name URL https://www.cvedetails.com/vulnerability-list/vendor_id-1749/ Imagemagick.html - ------------------------------------------------------------------------------- Copyright (C) 2003-2005 Jacques Vidrine and contributors. Please see the source of this document for full copyright information. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXPBb5maOgq3Tt24GAQiocw/9G6Z/Hh30Ufe76aYZomWHJsCcu70mHyhg twEnsTHAEgVyJ7+DB5m1IaKNiWyIhJtGKuAncvNi99rthPsKXKHI8+ziHKzRghJw /xTzSsi9naW5xMxlU7xh4tWjodGNBFgFdFuj3M95VsLbNi2CBspZivuv6cJEjbAR ycfGaYyOXVi3q6S7PDUplRIhOsp2zdAcopaJvhwE+8BliDPfevdsK2VvBtjYloP6 HzUd96C0+Lmm4NTArpXKEIUNNkJ6u3noH+PoAoI7GB6K/h3tqy5e/4aljmO7yACr woU2iTEC1HEE452pRr919uWBfQEFH16k9M3PcJwnUKoMYrI6jfWdFW6dJWnTDvB+ CC8W2HlBFJeTEWH181ETfPzatkw2vIfmdf6ivOBgWZ+z+Iw0te8mrd8Up/It+DBj jhG/aE/+3HbA3Kmv1FK3PnB3WXp7T0875Syba+BHReap7OzTIqCnn6M1hmg71JjV evs8RO9Mfn+CYVP6akHibCTCnY1MfUMGD4vmEMm7dG84YJ858iZMDlrhJsj4yyBF o/auFyqUsyRhPUhfqYDM8CTfml/EElqoS2GG1d/jhrsUg0/CShoeAKkt/nzsNppZ IFb6VEDVhqFMCJAmuoBffzAYs6U5j6j4gGo0+aAnjlIlgwSbSyAOkxHwSdl5hRth +15jZDvlhwA= =ojSD -----END PGP SIGNATURE-----