Ubuntu 3785-1: ImageMagick vulnerabilities

    Date04 Oct 2018
    CategoryUbuntu
    2905
    Posted ByAnthony Pell
    Several security issues were fixed in ImageMagick.
    ==========================================================================
    Ubuntu Security Notice USN-3785-1
    October 04, 2018
    
    imagemagick vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    
    Summary:
    
    Several security issues were fixed in ImageMagick.
    
    Software Description:
    - imagemagick: Image manipulation programs and library
    
    Details:
    
    Due to a large number of issues discovered in GhostScript that prevent
    it from being used by ImageMagick safely, this update includes a
    default policy change that disables support for the Postscript and
    PDF formats in ImageMagick. This policy can be overridden if necessary
    by using an alternate ImageMagick policy configuration.
    
    It was discovered that several memory leaks existed when handling
    certain images in ImageMagick. An attacker could use this to cause a
    denial of service. (CVE-2018-14434, CVE-2018-14435, CVE-2018-14436,
    CVE-2018-14437, CVE-2018-16640, CVE-2018-16750)
    
    It was discovered that ImageMagick did not properly initialize a
    variable before using it when processing MAT images. An attacker could
    use this to cause a denial of service or possibly execute arbitrary
    code. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-14551)
    
    It was discovered that an information disclosure vulnerability existed
    in ImageMagick when processing XBM images. An attacker could use this
    to expose sensitive information. (CVE-2018-16323)
    
    It was discovered that an out-of-bounds write vulnerability existed
    in ImageMagick when handling certain images. An attacker could use
    this to cause a denial of service or possibly execute arbitrary code.
    (CVE-2018-16642)
    
    It was discovered that ImageMagick did not properly check for errors
    in some situations. An attacker could use this to cause a denial of
    service. (CVE-2018-16643)
    
    It was discovered that ImageMagick did not properly validate image
    meta data in some situations. An attacker could use this to cause a
    denial of service. (CVE-2018-16644)
    
    It was discovered that ImageMagick did not prevent excessive memory
    allocation when handling certain image types. An attacker could use
    this to cause a denial of service. (CVE-2018-16645)
    
    Sergej Schumilo and Cornelius Aschermann discovered that ImageMagick
    did not properly check for NULL in some situations when processing
    PNG images. An attacker could use this to cause a denial of service.
    (CVE-2018-16749)
    
    USN-3681-1 fixed vulnerabilities in Imagemagick. Unfortunately,
    the fix for CVE-2017-13144 introduced a regression in ImageMagick in
    Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. This update reverts the fix
    for CVE-2017-13144 for those releases.
    
    We apologize for the inconvenience.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 18.04 LTS:
      imagemagick                     8:6.9.7.4+dfsg-16ubuntu6.4
      imagemagick-6.q16               8:6.9.7.4+dfsg-16ubuntu6.4
      libmagick++-6.q16-7             8:6.9.7.4+dfsg-16ubuntu6.4
      libmagickcore-6.q16-3           8:6.9.7.4+dfsg-16ubuntu6.4
      libmagickcore-6.q16-3-extra     8:6.9.7.4+dfsg-16ubuntu6.4
    
    Ubuntu 16.04 LTS:
      imagemagick                     8:6.8.9.9-7ubuntu5.13
      imagemagick-6.q16               8:6.8.9.9-7ubuntu5.13
      libmagick++-6.q16-5v5           8:6.8.9.9-7ubuntu5.13
      libmagickcore-6.q16-2           8:6.8.9.9-7ubuntu5.13
      libmagickcore-6.q16-2-extra     8:6.8.9.9-7ubuntu5.13
    
    Ubuntu 14.04 LTS:
      imagemagick                     8:6.7.7.10-6ubuntu3.13
      libmagick++5                    8:6.7.7.10-6ubuntu3.13
      libmagickcore5                  8:6.7.7.10-6ubuntu3.13
      libmagickcore5-extra            8:6.7.7.10-6ubuntu3.13
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://usn.ubuntu.com/usn/usn-3785-1
      CVE-2018-14434, CVE-2018-14435, CVE-2018-14436, CVE-2018-14437,
      CVE-2018-14551, CVE-2018-16323, CVE-2018-16640, CVE-2018-16642,
      CVE-2018-16643, CVE-2018-16644, CVE-2018-16645, CVE-2018-16749,
      CVE-2018-16750, https://launchpad.net/bugs/1793485
    
    Package Information:
      https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu6.4
      https://launchpad.net/ubuntu/+source/imagemagick/8:6.8.9.9-7ubuntu5.13
      https://launchpad.net/ubuntu/+source/imagemagick/8:6.7.7.10-6ubuntu3.13
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.1,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"28","type":"x","order":"3","pct":35.9,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.