Linux Security
Linux Security
Linux Security

Debian: DSA-3746-1: graphicsmagick security update

Date 24 Dec 2016
152
Posted By LinuxSecurity Advisories
Several vulnerabilities have been discovered in GraphicsMagick, a collection of image processing tool, which can cause denial of service attacks, remote file deletion, and remote command execution.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3746-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                            Luciano Bello
December 24, 2016                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : graphicsmagick
CVE ID         : CVE-2015-8808 CVE-2016-2317 CVE-2016-2318 CVE-2016-3714
                 CVE-2016-3715 CVE-2016-5118 CVE-2016-5240 CVE-2016-7800
                 CVE-2016-7996 CVE-2016-7997 CVE-2016-8682 CVE-2016-8683
                 CVE-2016-8684 CVE-2016-9830
Debian Bug     : 814732 825800 847055

Several vulnerabilities have been discovered in GraphicsMagick, a
collection of image processing tool, which can cause denial of service
attacks, remote file deletion, and remote command execution.

This security update removes the full support of PLT/Gnuplot decoder to
prevent Gnuplot-shell based shell exploits for fixing the CVE-2016-3714
vulnerability.

The undocumented "TMP" magick prefix no longer removes the argument file
after it has been read for fixing the CVE-2016-3715 vulnerability. Since
the "TMP" feature was originally implemented, GraphicsMagick added a
temporary file management subsystem which assures that temporary files
are removed so this feature is not needed.

Remove support for reading input from a shell command, or writing output
to a shell command, by prefixing the specified filename (containing the
command) with a '|' for fixing the CVE-2016-5118 vulnerability.

CVE-2015-8808

    Gustavo Grieco discovered an out of bound read in the parsing of GIF
    files which may cause denial of service.

CVE-2016-2317

    Gustavo Grieco discovered a stack buffer overflow and two heap buffer
    overflows while processing SVG images which may cause denial of service.

CVE-2016-2318

    Gustavo Grieco discovered several segmentation faults while processing
    SVG images which may cause denial of service.

CVE-2016-5240

    Gustavo Grieco discovered an endless loop problem caused by negative
    stroke-dasharray arguments while parsing SVG files which may cause
    denial of service.

CVE-2016-7800

    Marco Grassi discovered an unsigned underflow leading to heap overflow
    when parsing 8BIM chunk often attached to JPG files which may cause
    denial of service.

CVE-2016-7996

    Moshe Kaplan discovered that there is no check that the provided
    colormap is not larger than 256 entries in the WPG reader which may
    cause denial of service.

CVE-2016-7997

    Moshe Kaplan discovered that an assertion is thrown for some files in
    the WPG reader due to a logic error which may cause denial of service.

CVE-2016-8682

    Agostino Sarubbo of Gentoo discovered a stack buffer read overflow
    while reading the SCT header which may cause denial of service.

CVE-2016-8683

    Agostino Sarubbo of Gentoo discovered a memory allocation failure in the
    PCX coder which may cause denial of service.

CVE-2016-8684

    Agostino Sarubbo of Gentoo discovered a memory allocation failure in the
    SGI coder which may cause denial of service.

CVE-2016-9830

    Agostino Sarubbo of Gentoo discovered a memory allocation failure in
    MagickRealloc() function which may cause denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 1.3.20-3+deb8u2.

For the testing distribution (stretch), these problems (with the
exception of CVE-2016-9830) have been fixed in version 1.3.25-5.

For the unstable distribution (sid), these problems have been fixed in
version 1.3.25-6.

We recommend that you upgrade your graphicsmagick packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"50","type":"x","order":"1","pct":80.65,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.29,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.06,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.