Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3918 imagemagick security update 22 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: imagemagick Publisher: Debian Operating System: Debian GNU/Linux 8 UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-15140 CVE-2019-15139 CVE-2019-14981 CVE-2019-11470 Reference: ESB-2019.2302 ESB-2019.2294 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running imagemagick check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : imagemagick Version : 8:6.8.9.9-5+deb8u18 CVE ID : CVE-2019-11470 CVE-2019-14981 CVE-2019-15139 CVE-2019-15140 Multiple vulnerabilities have been found in imagemagick, an image processing toolkit. CVE-2019-11470 Uncontrolled resource consumption caused by insufficiently sanitized image size in ReadCINImage (coders/cin.c). This vulnerability might be leveraged by remote attackers to cause denial of service via a crafted Cineon image. CVE-2019-14981 Divide-by-zero vulnerability in MeanShiftImage (magick/feature.c). This vulnerability might be leveraged by remote attackers to cause denial of service via crafted image data. CVE-2019-15139 Out-of-bounds read in ReadXWDImage (coders/xwd.c). This vulnerability might be leveraged by remote attackers to cause denial of service via a crafted XWD (X Window System window dumping file) image file. CVE-2019-15140 Bound checking issue in ReadMATImage (coders/mat.c), potentially leading to use-after-free. This vulnerability might be leveraged by remote attackers to cause denial of service or any other unspecified impact via a crafted MAT image file. For Debian 8 "Jessie", these problems have been fixed in version 8:6.8.9.9-5+deb8u18. We recommend that you upgrade your imagemagick packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQGzBAEBCgAdFiEEeDb9QWtkMa2LX4zREeMFjl5EGkIFAl2tdIcACgkQEeMFjl5E GkKTPwwAqtQhPT+Fko3ii29cesbysIQguLqqm7u2rhVGPzGSa2HWdRa0U/Cr+xlQ SKXpQkAYIlX7laXJO4qQupYEC/rYabhL+MzTe+YNHFe7hQlGLfS+8B7alIMdOc4Y sOGZ0l/utplAT2ms4OFz6wY/h8iCAIVkgtMG5etmcx9DHLjN5kUb8+JfnGjuxQ7E 1iRK9ZGFkk82MRyB2E/HgrOHFOeLDiwUyQeRisrNTNf/yt+Sy88MXFCJ1AEQvWSl Q8oztTRxw3yKxXyn3AiBm6vR/8f41YJR6hL9MdX8cfQ/HWgMLqTqsTgcjYCeGVM1 gWjlbxWDC6Ym12opo5epO6T0fXi6NHNJtyNuiHOHg1ieZVRD5d2OIhNxxv9xFhI8 5FVUJ7IjEioNopYYOFq3AvhI20aW2VuUMTBuLuWpoYsE5J2DbNpaSX82EsBQbI8J 1jqSFY99W8cyKnq2xdD3MVyHlcrMdS/Ubf38zfFRTzXup95zGdDhqkuQkl1kEyOY nPXApiw4 =bf8B - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXa5VcWaOgq3Tt24GAQjUEA//eFVz3juoaGu6Yh81OfMFwfhjCLrNHnXL vr+8nXo4w9EblHsh/mIraMP7zt6yetSFl1BpbPmss52hr0RIJYyO4pg1+MwU0eXA aml9h3zxWN8mn9nTq5r16DwVJaHjXkurJZlQpsbH7iUpmjH8y9LMSITJRKdQUlua jYBm2LMudIRLE8c4GjoV2IB29wofe2d4nF7DqDpeb7c66ilTsUYFnDmR+ZSfBEkn ZDG8jP6p3FYc0t8C+wLcM4RCrjuNDkAttEoIhRSrFOBTYb1kiv0huykEIKgERiwP epcuLpYHh4phPxDLEp/G4Taw5RqBPQHMPaxDgz1YVSpZGWFfsmR9s7HVXYfGBtSn EijPm1HTTE4HWGDKAAAFBo6VCfhuBbk1xpU+hQZiC6CkQWQuFExheNRsjAw0vjw+ lErdYzK5OrVPY8otYqmCkbIaxuuFDVzgQk/oj89kozmtmmzt+eZVcXwOUlzxpGmE rSkiAqUTXXmmqp4Cm+iBcRZn4HlFoQy492Mzii4DBKDwm5dqW8LlIGnFEZFiuvFx P0Z0JQg/SpEqjGISp7KN48to+qAd6AbLYZmdgt+va971EsIZ0jhlyrh9cvnxPFFm PEVtLx1ZvzAzJb9UK1wyRoEATeOlTGiVocN2rHPMmEWPw+30DKNfFOJusSISJrqb sQPxcN1kbP8= =xIZA -----END PGP SIGNATURE-----