-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3918
                        imagemagick security update
                              22 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           imagemagick
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15140 CVE-2019-15139 CVE-2019-14981
                   CVE-2019-11470  

Reference:         ESB-2019.2302
                   ESB-2019.2294

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running imagemagick check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : imagemagick
Version        : 8:6.8.9.9-5+deb8u18
CVE ID         : CVE-2019-11470 CVE-2019-14981 CVE-2019-15139 CVE-2019-15140

Multiple vulnerabilities have been found in imagemagick, an image processing
toolkit.

CVE-2019-11470

    Uncontrolled resource consumption caused by insufficiently sanitized image
    size in ReadCINImage (coders/cin.c). This vulnerability might be leveraged
    by remote attackers to cause denial of service via a crafted Cineon image.

CVE-2019-14981

    Divide-by-zero vulnerability in MeanShiftImage (magick/feature.c). This
    vulnerability might be leveraged by remote attackers to cause denial of
    service via crafted image data.

CVE-2019-15139

    Out-of-bounds read in ReadXWDImage (coders/xwd.c). This vulnerability might
    be leveraged by remote attackers to cause denial of service via a crafted
    XWD (X Window System window dumping file) image file.

CVE-2019-15140

    Bound checking issue in ReadMATImage (coders/mat.c), potentially leading to
    use-after-free. This vulnerability might be leveraged by remote attackers to
    cause denial of service or any other unspecified impact via a crafted MAT
    image file.

For Debian 8 "Jessie", these problems have been fixed in version
8:6.8.9.9-5+deb8u18.

We recommend that you upgrade your imagemagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=bf8B
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=xIZA
-----END PGP SIGNATURE-----