SUSE SLES11 Security Update : ImageMagick (SUSE-SU-2016:1782-1)

critical Nessus Plugin ID 93178

Synopsis

The remote SUSE host is missing one or more security updates.

Description

ImageMagick was updated to fix 55 security issues.

These security issues were fixed :

- CVE-2014-9810: SEGV in dpx file handler (bsc#983803).

- CVE-2014-9811: Crash in xwd file handler (bsc#984032).

- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).

- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).

- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).

- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).

- CVE-2014-9816: Out of bound access in viff image (bsc#984398).

- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).

- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).

- CVE-2014-9819: Heap overflow in palm files (bsc#984142).

- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).

- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).

- CVE-2014-9836: Crash in xpm file handling (bsc#984023).

- CVE-2014-9851: Crash when parsing resource block (bsc#984160).

- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).

- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).

- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).

- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).

- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).

- CVE-2014-9834: Heap overflow in pict file (bsc#984436).

- CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774).

- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).

- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).

- CVE-2015-8898: Prevent NULL pointer access in magick/constitute.c (bsc#983746).

- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).

- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).

- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).

- CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451).

- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).

- CVE-2014-9805: SEGV due to a corrupted pnm file.
(bsc#983752).

- CVE-2014-9808: SEGV due to corrupted dpc images.
(bsc#983796).

- CVE-2014-9820: heap overflow in xpm files (bsc#984150).

- CVE-2014-9823: heap overflow in palm file (bsc#984401).

- CVE-2014-9822: heap overflow in quantum file (bsc#984187).

- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).

- CVE-2014-9824: Heap overflow in psd file (bsc#984185).

- CVE-2014-9809: Fix a SEGV due to corrupted xwd images.
(bsc#983799).

- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).

- CVE-2014-9842: Memory leak in psd handling (bsc#984374).

- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).

- CVE-2014-9840: Out of bound access in palm file (bsc#984433).

- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).

- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).

- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).

- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).

- CVE-2014-9849: Crash in png coder (bsc#984018).

- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).

- CVE-2014-9807: Fix a double free in pdb coder.
(bsc#983794).

- CVE-2014-9829: Out of bound access in sun file (bsc#984409).

- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).

- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).

- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).

- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).

- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).

- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).

- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).

- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 11-SP4 :

zypper in -t patch sdksp4-ImageMagick-12643=1

SUSE Linux Enterprise Server 11-SP4 :

zypper in -t patch slessp4-ImageMagick-12643=1

SUSE Linux Enterprise Debuginfo 11-SP4 :

zypper in -t patch dbgsp4-ImageMagick-12643=1

To bring your system up-to-date, use 'zypper patch'.

See Also

https://bugzilla.suse.com/show_bug.cgi?id=983234

https://bugzilla.suse.com/show_bug.cgi?id=983253

https://bugzilla.suse.com/show_bug.cgi?id=983259

https://bugzilla.suse.com/show_bug.cgi?id=983292

https://bugzilla.suse.com/show_bug.cgi?id=983305

https://bugzilla.suse.com/show_bug.cgi?id=983308

https://bugzilla.suse.com/show_bug.cgi?id=983521

https://bugzilla.suse.com/show_bug.cgi?id=983523

https://bugzilla.suse.com/show_bug.cgi?id=983533

https://bugzilla.suse.com/show_bug.cgi?id=983739

https://bugzilla.suse.com/show_bug.cgi?id=983746

https://bugzilla.suse.com/show_bug.cgi?id=983752

https://bugzilla.suse.com/show_bug.cgi?id=983774

https://bugzilla.suse.com/show_bug.cgi?id=983794

https://bugzilla.suse.com/show_bug.cgi?id=983796

https://bugzilla.suse.com/show_bug.cgi?id=983799

https://bugzilla.suse.com/show_bug.cgi?id=983803

https://bugzilla.suse.com/show_bug.cgi?id=984018

https://bugzilla.suse.com/show_bug.cgi?id=984023

https://bugzilla.suse.com/show_bug.cgi?id=984028

https://bugzilla.suse.com/show_bug.cgi?id=984032

https://bugzilla.suse.com/show_bug.cgi?id=984035

https://bugzilla.suse.com/show_bug.cgi?id=984135

https://bugzilla.suse.com/show_bug.cgi?id=984137

https://bugzilla.suse.com/show_bug.cgi?id=984142

https://bugzilla.suse.com/show_bug.cgi?id=984144

https://bugzilla.suse.com/show_bug.cgi?id=984145

https://bugzilla.suse.com/show_bug.cgi?id=984150

https://bugzilla.suse.com/show_bug.cgi?id=984160

https://bugzilla.suse.com/show_bug.cgi?id=984166

https://bugzilla.suse.com/show_bug.cgi?id=984181

https://bugzilla.suse.com/show_bug.cgi?id=984409

https://bugzilla.suse.com/show_bug.cgi?id=984433

https://bugzilla.suse.com/show_bug.cgi?id=984436

https://bugzilla.suse.com/show_bug.cgi?id=985442

https://bugzilla.suse.com/show_bug.cgi?id=985448

https://bugzilla.suse.com/show_bug.cgi?id=985451

https://bugzilla.suse.com/show_bug.cgi?id=985456

https://bugzilla.suse.com/show_bug.cgi?id=985460

https://bugzilla.suse.com/show_bug.cgi?id=986608

https://bugzilla.suse.com/show_bug.cgi?id=986609

https://www.suse.com/security/cve/CVE-2014-9805/

https://www.suse.com/security/cve/CVE-2014-9806/

https://www.suse.com/security/cve/CVE-2014-9807/

https://www.suse.com/security/cve/CVE-2014-9808/

https://www.suse.com/security/cve/CVE-2014-9809/

https://www.suse.com/security/cve/CVE-2014-9810/

https://www.suse.com/security/cve/CVE-2014-9811/

https://www.suse.com/security/cve/CVE-2014-9812/

https://www.suse.com/security/cve/CVE-2014-9813/

https://www.suse.com/security/cve/CVE-2014-9814/

https://www.suse.com/security/cve/CVE-2014-9815/

https://www.suse.com/security/cve/CVE-2014-9816/

https://www.suse.com/security/cve/CVE-2014-9817/

https://www.suse.com/security/cve/CVE-2014-9818/

https://www.suse.com/security/cve/CVE-2014-9819/

https://www.suse.com/security/cve/CVE-2014-9820/

https://www.suse.com/security/cve/CVE-2014-9822/

https://www.suse.com/security/cve/CVE-2014-9823/

https://www.suse.com/security/cve/CVE-2014-9824/

https://www.suse.com/security/cve/CVE-2014-9826/

https://www.suse.com/security/cve/CVE-2014-9828/

https://www.suse.com/security/cve/CVE-2014-9829/

https://www.suse.com/security/cve/CVE-2014-9830/

https://www.suse.com/security/cve/CVE-2014-9831/

https://www.suse.com/security/cve/CVE-2014-9834/

https://www.suse.com/security/cve/CVE-2014-9835/

https://www.suse.com/security/cve/CVE-2014-9836/

https://www.suse.com/security/cve/CVE-2014-9837/

https://www.suse.com/security/cve/CVE-2014-9838/

https://www.suse.com/security/cve/CVE-2014-9839/

https://www.suse.com/security/cve/CVE-2014-9840/

https://www.suse.com/security/cve/CVE-2014-9842/

https://www.suse.com/security/cve/CVE-2014-9844/

https://www.suse.com/security/cve/CVE-2014-9845/

https://www.suse.com/security/cve/CVE-2014-9846/

https://www.suse.com/security/cve/CVE-2014-9847/

https://bugzilla.suse.com/show_bug.cgi?id=984184

https://bugzilla.suse.com/show_bug.cgi?id=984185

https://bugzilla.suse.com/show_bug.cgi?id=984186

https://bugzilla.suse.com/show_bug.cgi?id=984187

https://bugzilla.suse.com/show_bug.cgi?id=984193

https://bugzilla.suse.com/show_bug.cgi?id=984370

https://bugzilla.suse.com/show_bug.cgi?id=984372

https://bugzilla.suse.com/show_bug.cgi?id=984373

https://bugzilla.suse.com/show_bug.cgi?id=984374

https://bugzilla.suse.com/show_bug.cgi?id=984375

https://bugzilla.suse.com/show_bug.cgi?id=984379

https://bugzilla.suse.com/show_bug.cgi?id=984394

https://bugzilla.suse.com/show_bug.cgi?id=984398

https://bugzilla.suse.com/show_bug.cgi?id=984400

https://bugzilla.suse.com/show_bug.cgi?id=984401

https://bugzilla.suse.com/show_bug.cgi?id=984408

https://www.suse.com/security/cve/CVE-2014-9849/

https://www.suse.com/security/cve/CVE-2014-9851/

https://www.suse.com/security/cve/CVE-2014-9853/

https://www.suse.com/security/cve/CVE-2014-9854/

https://www.suse.com/security/cve/CVE-2015-8894/

https://www.suse.com/security/cve/CVE-2015-8896/

https://www.suse.com/security/cve/CVE-2015-8897/

https://www.suse.com/security/cve/CVE-2015-8898/

https://www.suse.com/security/cve/CVE-2015-8901/

https://www.suse.com/security/cve/CVE-2015-8902/

https://www.suse.com/security/cve/CVE-2015-8903/

https://www.suse.com/security/cve/CVE-2016-4562/

https://www.suse.com/security/cve/CVE-2016-4563/

https://www.suse.com/security/cve/CVE-2016-4564/

https://www.suse.com/security/cve/CVE-2016-5687/

https://www.suse.com/security/cve/CVE-2016-5688/

https://www.suse.com/security/cve/CVE-2016-5689/

https://www.suse.com/security/cve/CVE-2016-5690/

https://www.suse.com/security/cve/CVE-2016-5691/

https://www.suse.com/security/cve/CVE-2016-5841/

https://www.suse.com/security/cve/CVE-2016-5842/

http://www.nessus.org/u?79276ec4

Plugin Details

Severity: Critical

ID: 93178

File Name: suse_SU-2016-1782-1.nasl

Version: 2.13

Type: local

Agent: unix

Published: 8/29/2016

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:libmagickcore1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/11/2016

Vulnerability Publication Date: 6/4/2016

Reference Information

CVE: CVE-2014-9805, CVE-2014-9806, CVE-2014-9807, CVE-2014-9808, CVE-2014-9809, CVE-2014-9810, CVE-2014-9811, CVE-2014-9812, CVE-2014-9813, CVE-2014-9814, CVE-2014-9815, CVE-2014-9816, CVE-2014-9817, CVE-2014-9818, CVE-2014-9819, CVE-2014-9820, CVE-2014-9822, CVE-2014-9823, CVE-2014-9824, CVE-2014-9826, CVE-2014-9828, CVE-2014-9829, CVE-2014-9830, CVE-2014-9831, CVE-2014-9834, CVE-2014-9835, CVE-2014-9836, CVE-2014-9837, CVE-2014-9838, CVE-2014-9839, CVE-2014-9840, CVE-2014-9842, CVE-2014-9844, CVE-2014-9845, CVE-2014-9846, CVE-2014-9847, CVE-2014-9849, CVE-2014-9851, CVE-2014-9853, CVE-2014-9854, CVE-2015-8894, CVE-2015-8896, CVE-2015-8897, CVE-2015-8898, CVE-2015-8901, CVE-2015-8902, CVE-2015-8903, CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842