[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:0857-1 -- SLES ImageMagick, libMagickCore-6_Q16-1, libMagickWand-6_Q16-1

ID: oval:org.secpod.oval:def:89043842Date: (C)2021-03-05   (M)2024-04-04
Class: PATCHFamily: unix




This update for ImageMagick fixes several issues. These security issues were fixed: - CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted file . - CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a denial of service via a crafted file . - CVE-2017-18209: Prevent NULL pointer dereference in the GetOpenCLCachedFilesDirectory function caused by a memory allocation result that was not checked, related to GetOpenCLCacheDirectory . - CVE-2017-18211: Prevent NULL pointer dereference in the function saveBinaryCLProgram caused by a program-lookup result not being checked, related to CacheOpenCLKernel . - CVE-2017-9500: Prevent assertion failure in the function ResetImageProfileIterator, which allowed attackers to cause a denial of service via a crafted file . - CVE-2017-14739: The AcquireResampleFilterThreadSet function mishandled failed memory allocation, which allowed remote attackers to cause a denial of service via unspecified vectors . - CVE-2017-16353: Prevent memory information disclosure in the DescribeImage function caused by a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments were never checked . - CVE-2017-16352: Prevent a heap-based buffer overflow in the Display visual image directory feature of the DescribeImage function. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag . - CVE-2017-14314: Prevent off-by-one error in the DrawImage function that allowed remote attackers to cause a denial of service via a crafted file . - CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage function that allowed an attacker to perform denial of service by sending a crafted image file . - CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to perform Denial of Service by providing a crafted Image File as input . - CVE-2018-7470: The IsWEBPImageLossless function allowed attackers to cause a denial of service via a crafted file . - CVE-2018-7443: The ReadTIFFImage function did not properly validate the amount of image data in a file, which allowed remote attackers to cause a denial of service . - CVE-2017-15016: Prevent NULL pointer dereference vulnerability in ReadEnhMetaFile allowing for denial of service . - CVE-2017-15017: Prevent NULL pointer dereference vulnerability in ReadOneMNGImage allowing for denial of service . - CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause a denial of service via a crafted VIFF file . - CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a denial of service via a crafted BMP file .

Platform:
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP2
Product:
ImageMagick
libMagickCore-6_Q16-1
libMagickWand-6_Q16-1
Reference:
SUSE-SU-2018:0857-1
CVE-2017-11524
CVE-2017-12692
CVE-2017-12693
CVE-2017-13768
CVE-2017-14314
CVE-2017-14505
CVE-2017-14739
CVE-2017-15016
CVE-2017-15017
CVE-2017-16352
CVE-2017-16353
CVE-2017-18209
CVE-2017-18211
CVE-2017-9500
CVE-2018-7443
CVE-2018-7470
CVE-2018-8804
CVE    17
CVE-2018-8804
CVE-2017-16352
CVE-2017-18211
CVE-2017-16353
...

© SecPod Technologies