openSUSE Security Update : ImageMagick (openSUSE-2016-1282)

critical Nessus Plugin ID 94754

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for ImageMagick fixes the following issues: These vulnerabilities could be triggered by processing specially crafted image files, which could lead to a process crash or resource consumtion, or potentially have unspecified futher impact.

- CVE-2016-8684: Mismatch between real filesize and header values (bsc#1005123)

- CVE-2016-8683: Check that filesize is reasonable compared to the header value (bsc#1005127)

- CVE-2016-8682: Stack-buffer read overflow while reading SCT header (bsc#1005125)

- CVE-2016-8677: Memory allocation failure in AcquireQuantumPixels (bsc#1005328)

- CVE-2016-7996, CVE-2016-7997: WPG Reader Issues (bsc#1003629)

- CVE-2016-7800: 8BIM/8BIMW unsigned underflow leads to heap overflow (bsc#1002422)

- CVE-2016-7799: mogrify global buffer overflow (bsc#1002421)

- CVE-2016-7540: writing to RGF format aborts (bsc#1000394)

- CVE-2016-7539: Potential DOS by not releasing memory (bsc#1000715)

- CVE-2016-7538: SIGABRT for corrupted pdb file (bsc#1000712)

- CVE-2016-7537: Out of bound access for corrupted pdb file (bsc#1000711)

- CVE-2016-7535: Out of bound access for corrupted psd file (bsc#1000709)

- CVE-2016-7534: Out of bound access in generic decoder (bsc#1000708)

- CVE-2016-7533: Wpg file out of bound for corrupted file (bsc#1000707)

- CVE-2016-7532: fix handling of corrupted psd file (bsc#1000706)

- CVE-2016-7531: Pbd file out of bound access (bsc#1000704)

- CVE-2016-7530: Out of bound in quantum handling (bsc#1000703)

- CVE-2016-7529: Out-of-bound in quantum handling (bsc#1000399)

- CVE-2016-7528: Out-of-bound access in xcf file coder (bsc#1000434)

- CVE-2016-7527: Out-of-bound access in wpg file coder:
(bsc#1000436)

- CVE-2016-7526: out-of-bounds write in ./MagickCore/pixel-accessor.h (bsc#1000702)

- CVE-2016-7525: Heap buffer overflow in psd file coder (bsc#1000701)

- CVE-2016-7524: AddressSanitizer:heap-buffer-overflow READ of size 1 in meta.c:465 (bsc#1000700)

- CVE-2016-7523: AddressSanitizer:heap-buffer-overflow READ of size 1 meta.c:496 (bsc#1000699)

- CVE-2016-7522: Out of bound access for malformed psd file (bsc#1000698)

- CVE-2016-7521: Heap buffer overflow in psd file handling (bsc#1000697)

- CVE-2016-7520: Heap overflow in hdr file handling (bsc#1000696)

- CVE-2016-7519: Out-of-bounds read in coders/rle.c (bsc#1000695)

- CVE-2016-7518: Out-of-bounds read in coders/sun.c (bsc#1000694)

- CVE-2016-7517: Out-of-bounds read in coders/pict.c (bsc#1000693)

- CVE-2016-7516: Out-of-bounds problem in rle, pict, viff and sun files (bsc#1000692)

- CVE-2016-7515: Rle file handling for corrupted file (bsc#1000689)

- CVE-2016-7514: Out-of-bounds read in coders/psd.c (bsc#1000688)

- CVE-2016-7513: Off-by-one error leading to segfault (bsc#1000686)

- CVE-2016-7101: raphicsMagick: SGI Coder Out-Of-Bounds Read Vulnerability (bsc#1001221)

- CVE-2016-6823: raphicsMagick: BMP Coder Out-Of-Bounds Write Vulnerability (bsc#1001066)

- CVE-2015-8959: dOS due to corrupted DDS files (bsc#1000713)

- CVE-2015-8958: Potential DOS in sun file handling due to malformed files (bsc#1000691)

- CVE-2015-8957: Buffer overflow in sun file handling (bsc#1000690)

- CVE-2014-9907: DOS due to corrupted DDS files (bsc#1000714)

- Buffer overflows in SIXEL, PDB, MAP, and TIFF coders (bsc#1002209)

- Divide by zero in WriteTIFFImage (bsc#1002206)

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected ImageMagick packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1000394

https://bugzilla.opensuse.org/show_bug.cgi?id=1000399

https://bugzilla.opensuse.org/show_bug.cgi?id=1000434

https://bugzilla.opensuse.org/show_bug.cgi?id=1000436

https://bugzilla.opensuse.org/show_bug.cgi?id=1000686

https://bugzilla.opensuse.org/show_bug.cgi?id=1000688

https://bugzilla.opensuse.org/show_bug.cgi?id=1000689

https://bugzilla.opensuse.org/show_bug.cgi?id=1000690

https://bugzilla.opensuse.org/show_bug.cgi?id=1000691

https://bugzilla.opensuse.org/show_bug.cgi?id=1000692

https://bugzilla.opensuse.org/show_bug.cgi?id=1000693

https://bugzilla.opensuse.org/show_bug.cgi?id=1000694

https://bugzilla.opensuse.org/show_bug.cgi?id=1000695

https://bugzilla.opensuse.org/show_bug.cgi?id=1000696

https://bugzilla.opensuse.org/show_bug.cgi?id=1000697

https://bugzilla.opensuse.org/show_bug.cgi?id=1000698

https://bugzilla.opensuse.org/show_bug.cgi?id=1000699

https://bugzilla.opensuse.org/show_bug.cgi?id=1000700

https://bugzilla.opensuse.org/show_bug.cgi?id=1000701

https://bugzilla.opensuse.org/show_bug.cgi?id=1000702

https://bugzilla.opensuse.org/show_bug.cgi?id=1000703

https://bugzilla.opensuse.org/show_bug.cgi?id=1000704

https://bugzilla.opensuse.org/show_bug.cgi?id=1000706

https://bugzilla.opensuse.org/show_bug.cgi?id=1000707

https://bugzilla.opensuse.org/show_bug.cgi?id=1000708

https://bugzilla.opensuse.org/show_bug.cgi?id=1000709

https://bugzilla.opensuse.org/show_bug.cgi?id=1000711

https://bugzilla.opensuse.org/show_bug.cgi?id=1000712

https://bugzilla.opensuse.org/show_bug.cgi?id=1000713

https://bugzilla.opensuse.org/show_bug.cgi?id=1000714

https://bugzilla.opensuse.org/show_bug.cgi?id=1000715

https://bugzilla.opensuse.org/show_bug.cgi?id=1001066

https://bugzilla.opensuse.org/show_bug.cgi?id=1001221

https://bugzilla.opensuse.org/show_bug.cgi?id=1002206

https://bugzilla.opensuse.org/show_bug.cgi?id=1002209

https://bugzilla.opensuse.org/show_bug.cgi?id=1002421

https://bugzilla.opensuse.org/show_bug.cgi?id=1002422

https://bugzilla.opensuse.org/show_bug.cgi?id=1003629

https://bugzilla.opensuse.org/show_bug.cgi?id=1005123

https://bugzilla.opensuse.org/show_bug.cgi?id=1005125

https://bugzilla.opensuse.org/show_bug.cgi?id=1005127

https://bugzilla.opensuse.org/show_bug.cgi?id=1005328

Plugin Details

Severity: Critical

ID: 94754

File Name: openSUSE-2016-1282.nasl

Version: 2.6

Type: local

Agent: unix

Published: 11/14/2016

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-3-debuginfo-32bit, p-cpe:/a:novell:opensuse:perl-perlmagick-debuginfo, p-cpe:/a:novell:opensuse:imagemagick-devel, p-cpe:/a:novell:opensuse:imagemagick-extra, p-cpe:/a:novell:opensuse:libmagick%2b%2b-devel, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-1, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-1-debuginfo, p-cpe:/a:novell:opensuse:imagemagick, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-3-32bit, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-1-32bit, cpe:/o:novell:opensuse:42.1, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-1-debuginfo, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-3, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-1-32bit, p-cpe:/a:novell:opensuse:libmagick%2b%2b-devel-32bit, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-1, p-cpe:/a:novell:opensuse:imagemagick-extra-debuginfo, p-cpe:/a:novell:opensuse:imagemagick-debugsource, p-cpe:/a:novell:opensuse:libmagick%2b%2b-6_q16-3-debuginfo, p-cpe:/a:novell:opensuse:libmagickcore-6_q16-1-debuginfo-32bit, p-cpe:/a:novell:opensuse:imagemagick-debuginfo, p-cpe:/a:novell:opensuse:perl-perlmagick, p-cpe:/a:novell:opensuse:imagemagick-devel-32bit, p-cpe:/a:novell:opensuse:libmagickwand-6_q16-1-debuginfo-32bit

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 11/10/2016

Reference Information

CVE: CVE-2014-9907, CVE-2015-8957, CVE-2015-8958, CVE-2015-8959, CVE-2016-6823, CVE-2016-7101, CVE-2016-7513, CVE-2016-7514, CVE-2016-7515, CVE-2016-7516, CVE-2016-7517, CVE-2016-7518, CVE-2016-7519, CVE-2016-7520, CVE-2016-7521, CVE-2016-7522, CVE-2016-7523, CVE-2016-7524, CVE-2016-7525, CVE-2016-7526, CVE-2016-7527, CVE-2016-7528, CVE-2016-7529, CVE-2016-7530, CVE-2016-7531, CVE-2016-7532, CVE-2016-7533, CVE-2016-7534, CVE-2016-7535, CVE-2016-7537, CVE-2016-7538, CVE-2016-7539, CVE-2016-7540, CVE-2016-7799, CVE-2016-7800, CVE-2016-7996, CVE-2016-7997, CVE-2016-8677, CVE-2016-8682, CVE-2016-8683, CVE-2016-8684