A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
{"veracode": [{"lastseen": "2022-07-26T16:45:43", "description": "ImageMagick is vulnerable to denial of service. A division by zero in `coders/jp2.c` allows an attacker to cause a denial of service condition by submitting a malicious file.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-25T00:58:58", "type": "veracode", "title": "Denial Of Service (DoS)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241"], "modified": "2021-03-26T02:07:44", "id": "VERACODE:29822", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-29822/summary", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "debiancve": [{"lastseen": "2023-05-29T14:18:19", "description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-09T18:15:00", "type": "debiancve", "title": "CVE-2021-20241", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241"], "modified": "2021-03-09T18:15:00", "id": "DEBIANCVE:CVE-2021-20241", "href": "https://security-tracker.debian.org/tracker/CVE-2021-20241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "redhatcve": [{"lastseen": "2023-09-06T02:42:22", "description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-02-15T21:58:51", "type": "redhatcve", "title": "CVE-2021-20241", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241"], "modified": "2023-08-31T16:09:06", "id": "RH:CVE-2021-20241", "href": "https://access.redhat.com/security/cve/cve-2021-20241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "ubuntucve": [{"lastseen": "2023-08-09T17:04:32", "description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a\ncrafted file that is processed by ImageMagick could trigger undefined\nbehavior in the form of math division by zero. The highest threat from this\nvulnerability is to system availability.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-09T00:00:00", "type": "ubuntucve", "title": "CVE-2021-20241", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241"], "modified": "2021-03-09T00:00:00", "id": "UB:CVE-2021-20241", "href": "https://ubuntu.com/security/CVE-2021-20241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-08-09T17:04:24", "description": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who\nsubmits a crafted file that is processed by ImageMagick could trigger\nundefined behavior in the form of math division by zero. The highest threat\nfrom this vulnerability is to system availability.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | same commit as CVE-2021-20241\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-09T00:00:00", "type": "ubuntucve", "title": "CVE-2021-20243", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241", "CVE-2021-20243"], "modified": "2021-03-09T00:00:00", "id": "UB:CVE-2021-20243", "href": "https://ubuntu.com/security/CVE-2021-20243", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "cve": [{"lastseen": "2023-05-29T14:15:39", "description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-09T18:15:00", "type": "cve", "title": "CVE-2021-20241", "cwe": [], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241"], "modified": "2023-05-22T02:15:00", "cpe": ["cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2021-20241", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}], "prion": [{"lastseen": "2023-08-16T00:58:03", "description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-09T18:15:00", "type": "prion", "title": "CVE-2021-20241", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241"], "modified": "2023-05-22T02:15:00", "id": "PRION:CVE-2021-20241", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-20241", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "suse": [{"lastseen": "2022-04-18T12:40:33", "description": "An update that fixes four vulnerabilities is now available.\n\nDescription:\n\n This update for ImageMagick fixes the following issues:\n\n - CVE-2021-20241 [bsc#1182335]: Division by zero in WriteJP2Image() in\n coders/jp2.c\n - CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight\n in MagickCore/resize.c\n - CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in\n MagickCore/visual-effects.c\n - CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in\n MagickCore/resample.c\n\n This update was imported from the SUSE:SLE-15-SP2:Update update project.\n\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.2:\n\n zypper in -t patch openSUSE-2021-377=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-03T00:00:00", "type": "suse", "title": "Security update for ImageMagick (moderate)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2021-03-03T00:00:00", "id": "OPENSUSE-SU-2021:0377-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SG6MVYKVW7O5POXSG4CGOWDIOAZCWWT/", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2023-07-11T14:40:33", "description": "This update for ImageMagick fixes the following issues :\n\n - CVE-2021-20241 [bsc#1182335]: Division by zero in WriteJP2Image() in coders/jp2.c\n\n - CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c\n\n - CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c\n\n - CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "cvss3": {}, "published": "2021-03-05T00:00:00", "type": "nessus", "title": "openSUSE Security Update : ImageMagick (openSUSE-2021-377)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2022-02-24T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:imagemagick", "p-cpe:/a:novell:opensuse:imagemagick-config-7-suse", "p-cpe:/a:novell:opensuse:imagemagick-config-7-upstream", "p-cpe:/a:novell:opensuse:imagemagick-debuginfo", "p-cpe:/a:novell:opensuse:imagemagick-debugsource", "p-cpe:/a:novell:opensuse:imagemagick-devel", "p-cpe:/a:novell:opensuse:imagemagick-devel-32bit", "p-cpe:/a:novell:opensuse:imagemagick-extra", "p-cpe:/a:novell:opensuse:imagemagick-extra-debuginfo", "p-cpe:/a:novell:opensuse:libmagick%2b%2b-7_q16hdri4", "p-cpe:/a:novell:opensuse:libmagick%2b%2b-7_q16hdri4-32bit", "p-cpe:/a:novell:opensuse:libmagick%2b%2b-7_q16hdri4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libmagick%2b%2b-7_q16hdri4-debuginfo", "p-cpe:/a:novell:opensuse:libmagick%2b%2b-devel", "p-cpe:/a:novell:opensuse:libmagick%2b%2b-devel-32bit", "p-cpe:/a:novell:opensuse:libmagickcore-7_q16hdri6", "p-cpe:/a:novell:opensuse:libmagickcore-7_q16hdri6-32bit", "p-cpe:/a:novell:opensuse:libmagickcore-7_q16hdri6-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libmagickcore-7_q16hdri6-debuginfo", "p-cpe:/a:novell:opensuse:libmagickwand-7_q16hdri6", "p-cpe:/a:novell:opensuse:libmagickwand-7_q16hdri6-32bit", "p-cpe:/a:novell:opensuse:libmagickwand-7_q16hdri6-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libmagickwand-7_q16hdri6-debuginfo", "p-cpe:/a:novell:opensuse:perl-perlmagick", "p-cpe:/a:novell:opensuse:perl-perlmagick-debuginfo", "cpe:/o:novell:opensuse:15.2"], "id": "OPENSUSE-2021-377.NASL", "href": "https://www.tenable.com/plugins/nessus/147150", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2021-377.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(147150);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/24\");\n\n script_cve_id(\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20246\"\n );\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n\n script_name(english:\"openSUSE Security Update : ImageMagick (openSUSE-2021-377)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for ImageMagick fixes the following issues :\n\n - CVE-2021-20241 [bsc#1182335]: Division by zero in\n WriteJP2Image() in coders/jp2.c\n\n - CVE-2021-20243 [bsc#1182336]: Division by zero in\n GetResizeFilterWeight in MagickCore/resize.c\n\n - CVE-2021-20244 [bsc#1182325]: Division by zero in\n ImplodeImage in MagickCore/visual-effects.c\n\n - CVE-2021-20246 [bsc#1182337]: Division by zero in\n ScaleResampleFilter in MagickCore/resample.c\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update\nproject.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1182325\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1182335\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1182336\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1182337\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ImageMagick packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-20246\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/03/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/03/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/03/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-config-7-SUSE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-config-7-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:ImageMagick-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagick++-7_Q16HDRI4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagick++-7_Q16HDRI4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagick++-7_Q16HDRI4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagick++-7_Q16HDRI4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagick++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagick++-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickCore-7_Q16HDRI6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickCore-7_Q16HDRI6-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickCore-7_Q16HDRI6-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickCore-7_Q16HDRI6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickWand-7_Q16HDRI6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickWand-7_Q16HDRI6-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickWand-7_Q16HDRI6-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libMagickWand-7_Q16HDRI6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-PerlMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-PerlMagick-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-config-7-SUSE-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-config-7-upstream-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-debugsource-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-devel-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-extra-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"ImageMagick-extra-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagick++-7_Q16HDRI4-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagick++-devel-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagickCore-7_Q16HDRI6-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagickWand-7_Q16HDRI6-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"perl-PerlMagick-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"perl-PerlMagick-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"ImageMagick-devel-32bit-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagick++-devel-32bit-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp152.12.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", cpu:\"x86_64\", reference:\"libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp152.12.12.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ImageMagick / ImageMagick-config-7-SUSE / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-11T14:49:35", "description": "It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2022-2022-164 advisory.\n\n - A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through a division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20176)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20309)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-05T00:00:00", "type": "nessus", "title": "Amazon Linux 2022 : (ALAS2022-2022-164)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20246", "CVE-2021-20309"], "modified": "2022-11-05T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:imagemagick", "p-cpe:/a:amazon:linux:imagemagick-c%2b%2b", "p-cpe:/a:amazon:linux:imagemagick-c%2b%2b-debuginfo", "p-cpe:/a:amazon:linux:imagemagick-c%2b%2b-devel", "p-cpe:/a:amazon:linux:imagemagick-debuginfo", "p-cpe:/a:amazon:linux:imagemagick-debugsource", "p-cpe:/a:amazon:linux:imagemagick-devel", "p-cpe:/a:amazon:linux:imagemagick-doc", "p-cpe:/a:amazon:linux:imagemagick-libs", "p-cpe:/a:amazon:linux:imagemagick-libs-debuginfo", "p-cpe:/a:amazon:linux:imagemagick-perl", "p-cpe:/a:amazon:linux:imagemagick-perl-debuginfo", "cpe:/o:amazon:linux:2022"], "id": "AL2022_ALAS2022-2022-164.NASL", "href": "https://www.tenable.com/plugins/nessus/167030", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2022 Security Advisory ALAS2022-2022-164.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(167030);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/11/05\");\n\n script_cve_id(\n \"CVE-2021-20176\",\n \"CVE-2021-20241\",\n \"CVE-2021-20246\",\n \"CVE-2021-20309\"\n );\n\n script_name(english:\"Amazon Linux 2022 : (ALAS2022-2022-164)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Amazon Linux 2022 host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2022-2022-164 advisory.\n\n - A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an\n attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through\n a division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20176)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in\n WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file\n submitted to an application using ImageMagick. The highest threat from this vulnerability is to system\n availability. (CVE-2021-20309)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/AL2022/ALAS-2022-164.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2021-20176.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2021-20241.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2021-20246.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/cve/html/CVE-2021-20309.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Run 'dnf update ImageMagick --releasever=2022.0.20221102' to update your system.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-20309\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-c++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ImageMagick-perl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2022\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar alas_release = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(alas_release) || !strlen(alas_release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nvar os_ver = pregmatch(pattern: \"^AL(A|\\d+|-\\d+)\", string:alas_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"-2022\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2022\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar pkgs = [\n {'reference':'ImageMagick-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-devel-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-devel-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-c++-devel-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-debugsource-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-debugsource-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-debugsource-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-devel-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-devel-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-devel-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-doc-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-doc-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-doc-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-libs-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-libs-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-libs-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-libs-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-libs-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-libs-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-perl-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-perl-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-perl-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-perl-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'aarch64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-perl-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'i686', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'ImageMagick-perl-debuginfo-6.9.12.48-2.amzn2022.0.6', 'cpu':'x86_64', 'release':'AL-2022', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ImageMagick / ImageMagick-c++ / ImageMagick-c++-debuginfo / etc\");\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-11T14:35:59", "description": "This update for ImageMagick fixes the following issues :\n\nCVE-2021-20241 [bsc#1182335]: Division by zero in WriteJP2Image() in coders/jp2.c\n\nCVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c\n\nCVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c\n\nCVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-03-01T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : ImageMagick (SUSE-SU-2021:0605-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2022-02-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:imagemagick", "p-cpe:/a:novell:suse_linux:imagemagick-config-7-suse", "p-cpe:/a:novell:suse_linux:imagemagick-config-7-upstream", "p-cpe:/a:novell:suse_linux:imagemagick-debuginfo", "p-cpe:/a:novell:suse_linux:imagemagick-debugsource", "p-cpe:/a:novell:suse_linux:imagemagick-devel", "p-cpe:/a:novell:suse_linux:libmagick%2b%2b", "p-cpe:/a:novell:suse_linux:libmagick%2b%2b-7_q16hdri4-debuginfo", "p-cpe:/a:novell:suse_linux:libmagick%2b%2b-devel", "p-cpe:/a:novell:suse_linux:libmagickcore", "p-cpe:/a:novell:suse_linux:libmagickcore-7_q16hdri6-debuginfo", "p-cpe:/a:novell:suse_linux:libmagickwand", "p-cpe:/a:novell:suse_linux:libmagickwand-7_q16hdri6-debuginfo", "p-cpe:/a:novell:suse_linux:perl-perlmagick", "p-cpe:/a:novell:suse_linux:perl-perlmagick-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2021-0605-1.NASL", "href": "https://www.tenable.com/plugins/nessus/146910", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2021:0605-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(146910);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/24\");\n\n script_cve_id(\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20246\"\n );\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : ImageMagick (SUSE-SU-2021:0605-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for ImageMagick fixes the following issues :\n\nCVE-2021-20241 [bsc#1182335]: Division by zero in WriteJP2Image() in\ncoders/jp2.c\n\nCVE-2021-20243 [bsc#1182336]: Division by zero in\nGetResizeFilterWeight in MagickCore/resize.c\n\nCVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in\nMagickCore/visual-effects.c\n\nCVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter\nin MagickCore/resample.c\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1182325\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1182335\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1182336\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1182337\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-20241/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-20243/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-20244/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-20246/\");\n # https://www.suse.com/support/update/announcement/2021/suse-su-20210605-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?32b7f723\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Development Tools 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-605=1\n\nSUSE Linux Enterprise Module for Desktop Applications 15-SP2 :\n\nzypper in -t patch\nSUSE-SLE-Module-Desktop-Applications-15-SP2-2021-605=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-20246\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/03/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/02/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/03/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ImageMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ImageMagick-config-7-SUSE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ImageMagick-config-7-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ImageMagick-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ImageMagick-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ImageMagick-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagick++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagick++-7_Q16HDRI4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagick++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagickCore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagickCore-7_Q16HDRI6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagickWand\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libMagickWand-7_Q16HDRI6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-PerlMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-PerlMagick-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"ImageMagick-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"ImageMagick-config-7-SUSE-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"ImageMagick-config-7-upstream-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"ImageMagick-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"ImageMagick-debugsource-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"ImageMagick-devel-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagick++-7_Q16HDRI4-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagick++-devel-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagickCore-7_Q16HDRI6-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagickWand-7_Q16HDRI6-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"perl-PerlMagick-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"perl-PerlMagick-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"ImageMagick-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"ImageMagick-config-7-SUSE-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"ImageMagick-config-7-upstream-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"ImageMagick-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"ImageMagick-debugsource-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"ImageMagick-devel-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagick++-7_Q16HDRI4-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagick++-devel-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagickCore-7_Q16HDRI6-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagickWand-7_Q16HDRI6-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"perl-PerlMagick-7.0.7.34-10.12.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"perl-PerlMagick-debuginfo-7.0.7.34-10.12.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ImageMagick\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-08T15:24:34", "description": "The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3429 advisory.\n\n - A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through a division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20176)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20245)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20309)\n\n - A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20312)\n\n - A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality. (CVE-2021-20313)\n\n - ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain=module rights=none pattern=PS />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain=coder rights=none pattern={PS,EPI,EPS,EPSF,EPSI} />. (CVE-2021-39212)\n\n - ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. (CVE-2022-28463)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32545)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32546)\n\n - In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32547)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-05-22T00:00:00", "type": "nessus", "title": "Debian DLA-3429-1 : imagemagick - LTS security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-39212", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547"], "modified": "2023-05-23T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:imagemagick", "p-cpe:/a:debian:debian_linux:imagemagick-6-common", "p-cpe:/a:debian:debian_linux:imagemagick-6-doc", "p-cpe:/a:debian:debian_linux:imagemagick-6.q16", "p-cpe:/a:debian:debian_linux:imagemagick-6.q16hdri", "p-cpe:/a:debian:debian_linux:imagemagick-common", "p-cpe:/a:debian:debian_linux:imagemagick-doc", "p-cpe:/a:debian:debian_linux:libimage-magick-perl", "p-cpe:/a:debian:debian_linux:libimage-magick-q16-perl", "p-cpe:/a:debian:debian_linux:libimage-magick-q16hdri-perl", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6-headers", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16-8", "p-cpe:/a:debian:debian_linux:libmagickwand-dev", "p-cpe:/a:debian:debian_linux:perlmagick", "cpe:/o:debian:debian_linux:10.0", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16-dev", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16hdri-8", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16hdri-dev", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-dev", "p-cpe:/a:debian:debian_linux:libmagickcore-6-arch-config", "p-cpe:/a:debian:debian_linux:libmagickcore-6-headers", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-6", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-6-extra", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-dev", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-6", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-6-extra", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-dev", "p-cpe:/a:debian:debian_linux:libmagickcore-dev", "p-cpe:/a:debian:debian_linux:libmagickwand-6-headers", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-6", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-dev", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-6", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-dev"], "id": "DEBIAN_DLA-3429.NASL", "href": "https://www.tenable.com/plugins/nessus/176199", "sourceData": "#%NASL_MIN_LEVEL 80900\n#\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory dla-3429. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(176199);\n script_version(\"1.1\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/23\");\n\n script_cve_id(\n \"CVE-2021-20176\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20245\",\n \"CVE-2021-20246\",\n \"CVE-2021-20309\",\n \"CVE-2021-20312\",\n \"CVE-2021-20313\",\n \"CVE-2021-39212\",\n \"CVE-2022-28463\",\n \"CVE-2022-32545\",\n \"CVE-2022-32546\",\n \"CVE-2022-32547\"\n );\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n script_xref(name:\"IAVB\", value:\"2022-B-0032-S\");\n script_xref(name:\"IAVB\", value:\"2022-B-0019-S\");\n\n script_name(english:\"Debian DLA-3429-1 : imagemagick - LTS security update\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Debian host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the\ndla-3429 advisory.\n\n - A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an\n attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through\n a division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20176)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20245)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in\n WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file\n submitted to an application using ImageMagick. The highest threat from this vulnerability is to system\n availability. (CVE-2021-20309)\n\n - A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of\n coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an\n attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is\n to system availability. (CVE-2021-20312)\n\n - A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate\n signatures in TransformSignature is possible. The highest threat from this vulnerability is to data\n confidentiality. (CVE-2021-20313)\n\n - ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you\n may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and\n in certain cases, Postscript files could be read and written when specifically excluded by a `module`\n policy in `policy.xml`. ex. <policy domain=module rights=none pattern=PS />. The issue has been\n resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module`\n policy and instead use the `coder` policy that is also our workaround recommendation: <policy\n domain=coder rights=none pattern={PS,EPI,EPS,EPSF,EPSI} />. (CVE-2021-39212)\n\n - ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. (CVE-2022-28463)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type\n 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative\n impact to application availability or other problems related to undefined behavior. (CVE-2022-32545)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type\n 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative\n impact to application availability or other problems related to undefined behavior. (CVE-2022-32546)\n\n - In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and\n for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted\n input is processed by ImageMagick, this causes a negative impact to application availability or other\n problems related to undefined behavior. (CVE-2022-32547)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996588\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/source-package/imagemagick\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.debian.org/lts/security/2023/dla-3429\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20176\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20241\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20243\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20245\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20246\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20309\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20312\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-20313\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2021-39212\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2022-28463\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2022-32545\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2022-32546\");\n script_set_attribute(attribute:\"see_also\", value:\"https://security-tracker.debian.org/tracker/CVE-2022-32547\");\n script_set_attribute(attribute:\"see_also\", value:\"https://packages.debian.org/source/buster/imagemagick\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the imagemagick packages.\n\nFor Debian 10 buster, these problems have been fixed in version 8\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-32547\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/05/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6.q16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6.q16hdri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libimage-magick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libimage-magick-q16-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libimage-magick-q16hdri-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16-8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16hdri-8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6-arch-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-6-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-6-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perlmagick\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Debian Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar debian_release = get_kb_item('Host/Debian/release');\nif ( isnull(debian_release) ) audit(AUDIT_OS_NOT, 'Debian');\ndebian_release = chomp(debian_release);\nif (! preg(pattern:\"^(10)\\.[0-9]+\", string:debian_release)) audit(AUDIT_OS_NOT, 'Debian 10.0', 'Debian ' + debian_release);\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);\n\nvar pkgs = [\n {'release': '10.0', 'prefix': 'imagemagick', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'imagemagick-6-common', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'imagemagick-6-doc', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'imagemagick-6.q16', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'imagemagick-6.q16hdri', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'imagemagick-common', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'imagemagick-doc', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libimage-magick-perl', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libimage-magick-q16-perl', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libimage-magick-q16hdri-perl', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagick++-6-headers', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagick++-6.q16-8', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagick++-6.q16-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagick++-6.q16hdri-8', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagick++-6.q16hdri-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagick++-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6-arch-config', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6-headers', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6.q16-6', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6.q16-6-extra', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6.q16-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6.q16hdri-6', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6.q16hdri-6-extra', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-6.q16hdri-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickcore-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickwand-6-headers', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickwand-6.q16-6', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickwand-6.q16-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickwand-6.q16hdri-6', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickwand-6.q16hdri-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'libmagickwand-dev', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'},\n {'release': '10.0', 'prefix': 'perlmagick', 'reference': '8:6.9.10.23+dfsg-2.1+deb10u5'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var _release = NULL;\n var prefix = NULL;\n var reference = NULL;\n if (!empty_or_null(package_array['release'])) _release = package_array['release'];\n if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (_release && prefix && reference) {\n if (deb_check(release:_release, prefix:prefix, reference:reference)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : deb_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = deb_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'imagemagick / imagemagick-6-common / imagemagick-6-doc / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:12", "description": "CVE reports :\n\nSeveral vulnerabilities have been discovered in ImageMagick :\n\n- CVE-2021-20313: A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible.\n\n- CVE-2021-20312: A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick.\n\n- CVE-2021-20311: A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick.\n\n- CVE-2021-20310: A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick.\n\n- CVE-2021-20309: A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick.\n\n- And several others...", "cvss3": {}, "published": "2021-05-14T00:00:00", "type": "nessus", "title": "FreeBSD : ImageMagick7 -- multiple vulnerabilities (a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-27829", "CVE-2020-29599", "CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20310", "CVE-2021-20311", "CVE-2021-20312", "CVE-2021-20313"], "modified": "2021-05-18T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:imagemagick7", "p-cpe:/a:freebsd:freebsd:imagemagick7-nox11", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_A7C60AF1B3F111EBA5F7A0F3C100AE18.NASL", "href": "https://www.tenable.com/plugins/nessus/149489", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(149489);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/18\");\n\n script_cve_id(\"CVE-2020-27829\", \"CVE-2020-29599\", \"CVE-2021-20176\", \"CVE-2021-20241\", \"CVE-2021-20243\", \"CVE-2021-20244\", \"CVE-2021-20245\", \"CVE-2021-20246\", \"CVE-2021-20309\", \"CVE-2021-20310\", \"CVE-2021-20311\", \"CVE-2021-20312\", \"CVE-2021-20313\");\n\n script_name(english:\"FreeBSD : ImageMagick7 -- multiple vulnerabilities (a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"CVE reports :\n\nSeveral vulnerabilities have been discovered in ImageMagick :\n\n- CVE-2021-20313: A flaw was found in ImageMagick in versions before\n7.0.11. A potential cipher leak when the calculate signatures in\nTransformSignature is possible.\n\n- CVE-2021-20312: A flaw was found in ImageMagick in versions 7.0.11,\nwhere an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c\nmay trigger undefined behavior via a crafted image file that is\nsubmitted by an attacker and processed by an application using\nImageMagick.\n\n- CVE-2021-20311: A flaw was found in ImageMagick in versions before\n7.0.11, where a division by zero in sRGBTransformImage() in the\nMagickCore/colorspace.c may trigger undefined behavior via a crafted\nimage file that is submitted by an attacker processed by an\napplication using ImageMagick.\n\n- CVE-2021-20310: A flaw was found in ImageMagick in versions before\n7.0.11, where a division by zero ConvertXYZToJzazbz() of\nMagickCore/colorspace.c may trigger undefined behavior via a crafted\nimage file that is submitted by an attacker and processed by an\napplication using ImageMagick.\n\n- CVE-2021-20309: A flaw was found in ImageMagick in versions before\n7.0.11, where a division by zero in WaveImage() of\nMagickCore/visual-effects.c may trigger undefined behavior via a\ncrafted image file submitted to an application using ImageMagick.\n\n- And several others...\"\n );\n # https://vuxml.freebsd.org/freebsd/a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?51bfa568\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-29599\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ImageMagick7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ImageMagick7-nox11\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/10/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"ImageMagick7<7.0.11.12\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ImageMagick7-nox11<7.0.11.12\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-13T14:53:35", "description": "The remote Ubuntu 16.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5335-1 advisory.\n\n - In ImageMagick before 6.9.7-10, there is a crash (rather than a width or height exceeds limit error report) if the image dimensions are too large, as demonstrated by use of the mpc coder. (CVE-2017-13144)\n\n - Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7. (CVE-2020-19667)\n\n - In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68. (CVE-2020-25664)\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25674)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by- zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69. (CVE-2020-27766)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27770)\n\n - A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through a division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20176)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-03-21T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS : ImageMagick vulnerabilities (USN-5335-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-13144", "CVE-2020-19667", "CVE-2020-25664", "CVE-2020-25665", "CVE-2020-25674", "CVE-2020-25676", "CVE-2020-27750", "CVE-2020-27753", "CVE-2020-27760", "CVE-2020-27762", "CVE-2020-27766", "CVE-2020-27770", "CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20243"], "modified": "2023-07-12T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:imagemagick", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-common", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-5v5", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev", "p-cpe:/a:canonical:ubuntu_linux:perlmagick"], "id": "UBUNTU_USN-5335-1.NASL", "href": "https://www.tenable.com/plugins/nessus/159107", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5335-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(159107);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/07/12\");\n\n script_cve_id(\n \"CVE-2017-13144\",\n \"CVE-2020-19667\",\n \"CVE-2020-25664\",\n \"CVE-2020-25665\",\n \"CVE-2020-25674\",\n \"CVE-2020-25676\",\n \"CVE-2020-27750\",\n \"CVE-2020-27753\",\n \"CVE-2020-27760\",\n \"CVE-2020-27762\",\n \"CVE-2020-27766\",\n \"CVE-2020-27770\",\n \"CVE-2021-20176\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\"\n );\n script_xref(name:\"USN\", value:\"5335-1\");\n script_xref(name:\"IAVB\", value:\"2020-B-0042-S\");\n\n script_name(english:\"Ubuntu 16.04 LTS : ImageMagick vulnerabilities (USN-5335-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe USN-5335-1 advisory.\n\n - In ImageMagick before 6.9.7-10, there is a crash (rather than a width or height exceeds limit error\n report) if the image dimensions are too large, as demonstrated by use of the mpc coder. (CVE-2017-13144)\n\n - Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick\n 7.0.10-7. (CVE-2020-19667)\n\n - In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and\n memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is\n called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially\n crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick\n versions prior to 6.9.10-68 and 7.0.8-68. (CVE-2020-25664)\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine\n WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the\n routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause\n impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that\n can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the\n colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass\n invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to\n MagickMin() to ensure the proper value is used. This could impact application availability when a\n specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-25674)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and\n InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained\n pixel offset calculations which were being used with the floor() function. These calculations produced\n undefined behavior in the form of out-of-range and integer overflows, as identified by\n UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is\n able to supply a crafted input file to be processed by ImageMagick. These issues could impact application\n availability or potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker\n who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form\n of values outside the range of type `unsigned char` and math division by zero. This would most likely lead\n to an impact to application availability, but could potentially cause other problems related to undefined\n behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values,\n which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact\n to application availability or cause a denial of service. It was originally reported that the issues were\n in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves\n issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This\n flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a\n divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an\n impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-\n zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n char`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick\n 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n `unsigned long`. This would most likely lead to an impact to application availability, but could\n potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions\n prior to 7.0.8-69. (CVE-2020-27766)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in\n SubstituteString(), causing potential impact to application availability. This could be triggered by a\n crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27770)\n\n - A divide-by-zero flaw was found in ImageMagick 6.9.11-57 and 7.0.10-57 in gem.c. This flaw allows an\n attacker who submits a crafted file that is processed by ImageMagick to trigger undefined behavior through\n a division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20176)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5335-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-27766\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/03/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-5v5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:perlmagick\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2022-2023 Canonical, Inc. / NASL script (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '16.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6.q16-5v5', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2-extra', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'},\n {'osver': '16.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm2'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'imagemagick / imagemagick-6.q16 / imagemagick-common / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-11T07:12:40", "description": "The remote Ubuntu 16.04 ESM / 18.04 LTS / 22.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5736-1 advisory.\n\n - A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks. (CVE-2021-3574)\n\n - A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system. (CVE-2021-4219)\n\n - An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined behaviour or a crash. (CVE-2021-20224)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20245)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20309)\n\n - A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20312)\n\n - A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality. (CVE-2021-20313)\n\n - ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain=module rights=none pattern=PS />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain=coder rights=none pattern={PS,EPI,EPS,EPSF,EPSI} />. (CVE-2021-39212)\n\n - A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service. (CVE-2022-1114)\n\n - ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. (CVE-2022-28463)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32545)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32546)\n\n - In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32547)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-11-24T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 ESM / 18.04 LTS / 22.10 : ImageMagick vulnerabilities (USN-5736-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-20224", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-3574", "CVE-2021-39212", "CVE-2021-4219", "CVE-2022-1114", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547"], "modified": "2023-07-10T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:esm", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:22.10", "p-cpe:/a:canonical:ubuntu_linux:imagemagick", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6-common", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16hdri", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-common", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16hdri-perl", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-5v5", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-7", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-8", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16hdri-7", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16hdri-8", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16hdri-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b5", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore5", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore5-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand5", "p-cpe:/a:canonical:ubuntu_linux:perlmagick"], "id": "UBUNTU_USN-5736-1.NASL", "href": "https://www.tenable.com/plugins/nessus/168160", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5736-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(168160);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/07/10\");\n\n script_cve_id(\n \"CVE-2021-3574\",\n \"CVE-2021-4219\",\n \"CVE-2021-20224\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20245\",\n \"CVE-2021-20246\",\n \"CVE-2021-20309\",\n \"CVE-2021-20312\",\n \"CVE-2021-20313\",\n \"CVE-2021-39212\",\n \"CVE-2022-1114\",\n \"CVE-2022-28463\",\n \"CVE-2022-32545\",\n \"CVE-2022-32546\",\n \"CVE-2022-32547\"\n );\n script_xref(name:\"USN\", value:\"5736-1\");\n\n script_name(english:\"Ubuntu 16.04 ESM / 18.04 LTS / 22.10 : ImageMagick vulnerabilities (USN-5736-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 ESM / 18.04 LTS / 22.10 host has packages installed that are affected by multiple\nvulnerabilities as referenced in the USN-5736-1 advisory.\n\n - A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert\n command, ASAN detects memory leaks. (CVE-2021-3574)\n\n - A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads\n to a denial of service. This flaw allows an attacker to crash the system. (CVE-2021-4219)\n\n - An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in\n MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of\n representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to\n an undefined behaviour or a crash. (CVE-2021-20224)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20245)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in\n WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file\n submitted to an application using ImageMagick. The highest threat from this vulnerability is to system\n availability. (CVE-2021-20309)\n\n - A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of\n coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an\n attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is\n to system availability. (CVE-2021-20312)\n\n - A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate\n signatures in TransformSignature is possible. The highest threat from this vulnerability is to data\n confidentiality. (CVE-2021-20313)\n\n - ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you\n may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and\n in certain cases, Postscript files could be read and written when specifically excluded by a `module`\n policy in `policy.xml`. ex. <policy domain=module rights=none pattern=PS />. The issue has been\n resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module`\n policy and instead use the `coder` policy that is also our workaround recommendation: <policy\n domain=coder rights=none pattern={PS,EPI,EPS,EPSF,EPSI} />. (CVE-2021-39212)\n\n - A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This\n vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for\n conversion, potentially leading to information disclosure and a denial of service. (CVE-2022-1114)\n\n - ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. (CVE-2022-28463)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type\n 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative\n impact to application availability or other problems related to undefined behavior. (CVE-2022-32545)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type\n 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative\n impact to application availability or other problems related to undefined behavior. (CVE-2022-32546)\n\n - In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and\n for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted\n input is processed by ImageMagick, this causes a negative impact to application availability or other\n problems related to undefined behavior. (CVE-2022-32547)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5736-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-32547\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/03/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/11/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/11/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:esm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:22.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16hdri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16hdri-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-5v5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore5-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:perlmagick\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2022-2023 Canonical, Inc. / NASL script (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release || '18.04' >< os_release || '22.10' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04 / 22.10', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '16.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6.q16-5v5', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2-extra', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '16.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm5'},\n {'osver': '18.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16-7', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16hdri-7', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-3-extra', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-3-extra', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16hdri-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '18.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.14'},\n {'osver': '22.10', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16-8', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16hdri-8', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16hdri-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'},\n {'osver': '22.10', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.1'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'imagemagick / imagemagick-6-common / imagemagick-6.q16 / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-05T05:27:30", "description": "The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 ESM / 22.10 / 23.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6200-1 advisory.\n\n - ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.\n (CVE-2020-29599)\n\n - An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined behaviour or a crash. (CVE-2021-20224)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20309)\n\n - A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability. (CVE-2021-20312)\n\n - A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality. (CVE-2021-20313)\n\n - A heap-based buffer overflow vulnerability was found in ImageMagick in versions prior to 7.0.11-14 in ReadTIFFImage() in coders/tiff.c. This issue is due to an incorrect setting of the pixel array size, which can lead to a crash and segmentation fault. (CVE-2021-3610)\n\n - ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and in certain cases, Postscript files could be read and written when specifically excluded by a `module` policy in `policy.xml`. ex. <policy domain=module rights=none pattern=PS />. The issue has been resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module` policy and instead use the `coder` policy that is also our workaround recommendation: <policy domain=coder rights=none pattern={PS,EPI,EPS,EPSF,EPSI} />. (CVE-2021-39212)\n\n - ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. (CVE-2022-28463)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32545)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32546)\n\n - In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior. (CVE-2022-32547)\n\n - A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in /tmp, resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G. (CVE-2023-1289)\n\n - A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.\n (CVE-2023-1906)\n\n - A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service. (CVE-2023-3195)\n\n - A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546). (CVE-2023-34151)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-07-04T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 ESM / 22.10 / 23.04 : ImageMagick vulnerabilities (USN-6200-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-29599", "CVE-2021-20224", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-3610", "CVE-2021-39212", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547", "CVE-2023-1289", "CVE-2023-1906", "CVE-2023-3195", "CVE-2023-34151", "CVE-2023-3428"], "modified": "2023-08-31T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:esm", "cpe:/o:canonical:ubuntu_linux:18.04:-:esm", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "cpe:/o:canonical:ubuntu_linux:22.04:-:esm", "cpe:/o:canonical:ubuntu_linux:22.10", "cpe:/o:canonical:ubuntu_linux:23.04", "p-cpe:/a:canonical:ubuntu_linux:imagemagick", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6-common", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16hdri-7", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16hdri-8", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16hdri-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3-extra", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6-extra", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16hdri", "p-cpe:/a:canonical:ubuntu_linux:imagemagick-common", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl", "p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16hdri-perl", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-5v5", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-7", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-8", "p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-3", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-6", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-dev", "p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev", "p-cpe:/a:canonical:ubuntu_linux:perlmagick"], "id": "UBUNTU_USN-6200-1.NASL", "href": "https://www.tenable.com/plugins/nessus/177934", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-6200-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(177934);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/08/31\");\n\n script_cve_id(\n \"CVE-2020-29599\",\n \"CVE-2021-3610\",\n \"CVE-2021-20224\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20246\",\n \"CVE-2021-20309\",\n \"CVE-2021-20312\",\n \"CVE-2021-20313\",\n \"CVE-2021-39212\",\n \"CVE-2022-28463\",\n \"CVE-2022-32545\",\n \"CVE-2022-32546\",\n \"CVE-2022-32547\",\n \"CVE-2023-1289\",\n \"CVE-2023-1906\",\n \"CVE-2023-3195\",\n \"CVE-2023-3428\",\n \"CVE-2023-34151\"\n );\n script_xref(name:\"USN\", value:\"6200-1\");\n script_xref(name:\"IAVB\", value:\"2020-B-0076-S\");\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n script_xref(name:\"IAVB\", value:\"2022-B-0032-S\");\n script_xref(name:\"IAVB\", value:\"2023-B-0020-S\");\n script_xref(name:\"IAVB\", value:\"2023-B-0038-S\");\n script_xref(name:\"IAVB\", value:\"2022-B-0019-S\");\n script_xref(name:\"IAVB\", value:\"2023-B-0046-S\");\n\n script_name(english:\"Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 ESM / 22.10 / 23.04 : ImageMagick vulnerabilities (USN-6200-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 ESM / 22.10 / 23.04 host has packages installed that are\naffected by multiple vulnerabilities as referenced in the USN-6200-1 advisory.\n\n - ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows\n setting a password for password-protected PDF files. The user-controlled password was not properly\n escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.\n (CVE-2020-29599)\n\n - An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in\n MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of\n representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to\n an undefined behaviour or a crash. (CVE-2021-20224)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\n - A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in\n WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file\n submitted to an application using ImageMagick. The highest threat from this vulnerability is to system\n availability. (CVE-2021-20309)\n\n - A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of\n coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an\n attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is\n to system availability. (CVE-2021-20312)\n\n - A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate\n signatures in TransformSignature is possible. The highest threat from this vulnerability is to data\n confidentiality. (CVE-2021-20313)\n\n - A heap-based buffer overflow vulnerability was found in ImageMagick in versions prior to 7.0.11-14 in\n ReadTIFFImage() in coders/tiff.c. This issue is due to an incorrect setting of the pixel array size, which\n can lead to a crash and segmentation fault. (CVE-2021-3610)\n\n - ImageMagick is free software delivered as a ready-to-run binary distribution or as source code that you\n may use, copy, modify, and distribute in both open and proprietary applications. In affected versions and\n in certain cases, Postscript files could be read and written when specifically excluded by a `module`\n policy in `policy.xml`. ex. <policy domain=module rights=none pattern=PS />. The issue has been\n resolved in ImageMagick 7.1.0-7 and in 6.9.12-22. Fortunately, in the wild, few users utilize the `module`\n policy and instead use the `coder` policy that is also our workaround recommendation: <policy\n domain=coder rights=none pattern={PS,EPI,EPS,EPSF,EPSI} />. (CVE-2021-39212)\n\n - ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. (CVE-2022-28463)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type\n 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative\n impact to application availability or other problems related to undefined behavior. (CVE-2022-32545)\n\n - A vulnerability was found in ImageMagick, causing an outside the range of representable values of type\n 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative\n impact to application availability or other problems related to undefined behavior. (CVE-2022-32546)\n\n - In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and\n for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted\n input is processed by ImageMagick, this causes a negative impact to application availability or other\n problems related to undefined behavior. (CVE-2022-32547)\n\n - A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a\n segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to\n a segmentation fault, generating many trash files in /tmp, resulting in a denial of service. When\n ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file\n contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of\n size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will\n generate about 10G. (CVE-2023-1289)\n\n - A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function\n in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an\n out-of-bounds read error, allowing an application to crash, resulting in a denial of service.\n (CVE-2023-1906)\n\n - A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker\n to trick the user into opening a specially crafted malicious tiff file, causing an application to crash,\n resulting in a denial of service. (CVE-2023-3195)\n\n - A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting\n double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546). (CVE-2023-34151)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-6200-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-32547\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2023/07/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/07/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:esm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:esm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:22.04:-:esm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:22.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:23.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16hdri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:imagemagick-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16hdri-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-5v5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagick++-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-6-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-6-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:perlmagick\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2023 Canonical, Inc. / NASL script (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release || '18.04' >< os_release || '20.04' >< os_release || '22.04' >< os_release || '22.10' >< os_release || '23.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04 / 20.04 / 22.04 / 22.10 / 23.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '16.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6.q16-5v5', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2-extra', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '16.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.8.9.9-7ubuntu5.16+esm8'},\n {'osver': '18.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16-7', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16hdri-7', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-3-extra', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-3-extra', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16hdri-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '18.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.15+esm1'},\n {'osver': '20.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagick++-6.q16-8', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagick++-6.q16hdri-8', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6.q16-6', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6.q16-6-extra', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6.q16hdri-6', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6.q16hdri-6-extra', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickwand-6.q16-6', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickwand-6.q16hdri-6', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '20.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.10.23+dfsg-2.1ubuntu11.9'},\n {'osver': '22.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagick++-6.q16-8', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagick++-6.q16hdri-8', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6.q16-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6.q16hdri-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickwand-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickwand-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.04.3+esm2'},\n {'osver': '22.10', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16-8', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16hdri-8', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16hdri-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '22.10', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.11.60+dfsg-1.3ubuntu0.22.10.5'},\n {'osver': '23.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagick++-6.q16-8', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagick++-6.q16hdri-8', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6.q16-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6.q16hdri-6-extra', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickwand-6.q16-6', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickwand-6.q16hdri-6', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'},\n {'osver': '23.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.11.60+dfsg-1.6ubuntu0.23.04.1'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'imagemagick / imagemagick-6-common / imagemagick-6.q16 / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:26:54", "description": "Multiple security vulnerabilities were found in Imagemagick. Missing or incomplete input sanitizing may lead to undefined behavior which can result in denial of service (application crash) or other unspecified impact.\n\nFor Debian 9 stretch, these problems have been fixed in version 8:6.9.7.4+dfsg-11+deb9u12.\n\nWe recommend that you upgrade your imagemagick packages.\n\nFor the detailed security status of imagemagick please refer to its security tracker page at:\nhttps://security-tracker.debian.org/tracker/imagemagick\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-03-24T00:00:00", "type": "nessus", "title": "Debian DLA-2602-1 : imagemagick security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-25666", "CVE-2020-25675", "CVE-2020-25676", "CVE-2020-27754", "CVE-2020-27757", "CVE-2020-27758", "CVE-2020-27759", "CVE-2020-27761", "CVE-2020-27762", "CVE-2020-27764", "CVE-2020-27766", "CVE-2020-27767", "CVE-2020-27768", "CVE-2020-27769", "CVE-2020-27770", "CVE-2020-27771", "CVE-2020-27772", "CVE-2020-27774", "CVE-2020-27775", "CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2022-02-25T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:imagemagick", "p-cpe:/a:debian:debian_linux:imagemagick-6-common", "p-cpe:/a:debian:debian_linux:imagemagick-6-doc", "p-cpe:/a:debian:debian_linux:imagemagick-6.q16", "p-cpe:/a:debian:debian_linux:imagemagick-6.q16hdri", "p-cpe:/a:debian:debian_linux:imagemagick-common", "p-cpe:/a:debian:debian_linux:imagemagick-doc", "p-cpe:/a:debian:debian_linux:libimage-magick-perl", "p-cpe:/a:debian:debian_linux:libimage-magick-q16-perl", "p-cpe:/a:debian:debian_linux:libimage-magick-q16hdri-perl", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6-headers", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16-7", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16-dev", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16hdri-7", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-6.q16hdri-dev", "p-cpe:/a:debian:debian_linux:libmagick%2b%2b-dev", "p-cpe:/a:debian:debian_linux:libmagickcore-6-arch-config", "p-cpe:/a:debian:debian_linux:libmagickcore-6-headers", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-3", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-3-extra", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-dev", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-3", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-3-extra", "p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-dev", "p-cpe:/a:debian:debian_linux:libmagickcore-dev", "p-cpe:/a:debian:debian_linux:libmagickwand-6-headers", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-3", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-dev", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-3", "p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-dev", "p-cpe:/a:debian:debian_linux:libmagickwand-dev", "p-cpe:/a:debian:debian_linux:perlmagick", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2602.NASL", "href": "https://www.tenable.com/plugins/nessus/148080", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2602-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(148080);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/02/25\");\n\n script_cve_id(\"CVE-2020-25666\", \"CVE-2020-25675\", \"CVE-2020-25676\", \"CVE-2020-27754\", \"CVE-2020-27757\", \"CVE-2020-27758\", \"CVE-2020-27759\", \"CVE-2020-27761\", \"CVE-2020-27762\", \"CVE-2020-27764\", \"CVE-2020-27766\", \"CVE-2020-27767\", \"CVE-2020-27768\", \"CVE-2020-27769\", \"CVE-2020-27770\", \"CVE-2020-27771\", \"CVE-2020-27772\", \"CVE-2020-27774\", \"CVE-2020-27775\", \"CVE-2021-20176\", \"CVE-2021-20241\", \"CVE-2021-20244\", \"CVE-2021-20246\");\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n\n script_name(english:\"Debian DLA-2602-1 : imagemagick security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Multiple security vulnerabilities were found in Imagemagick. Missing\nor incomplete input sanitizing may lead to undefined behavior which\ncan result in denial of service (application crash) or other\nunspecified impact.\n\nFor Debian 9 stretch, these problems have been fixed in version\n8:6.9.7.4+dfsg-11+deb9u12.\n\nWe recommend that you upgrade your imagemagick packages.\n\nFor the detailed security status of imagemagick please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/imagemagick\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/imagemagick\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/imagemagick\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-27766\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6.q16\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-6.q16hdri\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:imagemagick-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libimage-magick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libimage-magick-q16-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libimage-magick-q16hdri-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16-7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16hdri-7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagick++-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6-arch-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-3-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-3-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickcore-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-6.q16hdri-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libmagickwand-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perlmagick\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/03/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick-6-common\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick-6-doc\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick-6.q16\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick-6.q16hdri\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick-common\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"imagemagick-doc\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libimage-magick-perl\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libimage-magick-q16-perl\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libimage-magick-q16hdri-perl\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagick++-6-headers\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagick++-6.q16-7\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagick++-6.q16-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagick++-6.q16hdri-7\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagick++-6.q16hdri-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagick++-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6-arch-config\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6-headers\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6.q16-3\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6.q16-3-extra\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6.q16-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6.q16hdri-3\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6.q16hdri-3-extra\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-6.q16hdri-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickcore-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickwand-6-headers\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickwand-6.q16-3\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickwand-6.q16-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickwand-6.q16hdri-3\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickwand-6.q16hdri-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libmagickwand-dev\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"perlmagick\", reference:\"8:6.9.7.4+dfsg-11+deb9u12\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:43:45", "description": "According to the versions of the ImageMagick packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25666)\n\n - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `'dc:format=\\'image/dng\\'` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25667)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25674)\n\n - In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-25675)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27751)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. (CVE-2020-27754)\n\n - in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27755)\n\n - In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide- by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions.\n This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27756)\n\n - A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27757)\n\n - A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27758)\n\n - In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27759)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by- zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0. (CVE-2020-27761)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27763)\n\n - In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69. (CVE-2020-27764)\n\n - A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27765)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27767)\n\n - In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27768)\n\n - In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c. (CVE-2020-27769)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27770)\n\n - In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27771)\n\n - A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-27772)\n\n - A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27773)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27775)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27776)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2022-04-25T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : ImageMagick (EulerOS-SA-2022-1536)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-25665", "CVE-2020-25666", "CVE-2020-25667", "CVE-2020-25674", "CVE-2020-25675", "CVE-2020-25676", "CVE-2020-27750", "CVE-2020-27751", "CVE-2020-27753", "CVE-2020-27754", "CVE-2020-27755", "CVE-2020-27756", "CVE-2020-27757", "CVE-2020-27758", "CVE-2020-27759", "CVE-2020-27760", "CVE-2020-27761", "CVE-2020-27762", "CVE-2020-27763", "CVE-2020-27764", "CVE-2020-27765", "CVE-2020-27767", "CVE-2020-27768", "CVE-2020-27769", "CVE-2020-27770", "CVE-2020-27771", "CVE-2020-27772", "CVE-2020-27773", "CVE-2020-27775", "CVE-2020-27776", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2022-04-25T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:imagemagick", "p-cpe:/a:huawei:euleros:imagemagick-c%2b%2b", "p-cpe:/a:huawei:euleros:imagemagick-libs", "p-cpe:/a:huawei:euleros:imagemagick-perl", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2022-1536.NASL", "href": "https://www.tenable.com/plugins/nessus/160135", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(160135);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/25\");\n\n script_cve_id(\n \"CVE-2020-25665\",\n \"CVE-2020-25666\",\n \"CVE-2020-25667\",\n \"CVE-2020-25674\",\n \"CVE-2020-25675\",\n \"CVE-2020-25676\",\n \"CVE-2020-27750\",\n \"CVE-2020-27751\",\n \"CVE-2020-27753\",\n \"CVE-2020-27754\",\n \"CVE-2020-27755\",\n \"CVE-2020-27756\",\n \"CVE-2020-27757\",\n \"CVE-2020-27758\",\n \"CVE-2020-27759\",\n \"CVE-2020-27760\",\n \"CVE-2020-27761\",\n \"CVE-2020-27762\",\n \"CVE-2020-27763\",\n \"CVE-2020-27764\",\n \"CVE-2020-27765\",\n \"CVE-2020-27767\",\n \"CVE-2020-27768\",\n \"CVE-2020-27769\",\n \"CVE-2020-27770\",\n \"CVE-2020-27771\",\n \"CVE-2020-27772\",\n \"CVE-2020-27773\",\n \"CVE-2020-27775\",\n \"CVE-2020-27776\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20246\"\n );\n script_xref(name:\"IAVB\", value:\"2020-B-0076-S\");\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n\n script_name(english:\"EulerOS 2.0 SP5 : ImageMagick (EulerOS-SA-2022-1536)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ImageMagick packages installed, the EulerOS installation on the remote host is affected\nby the following vulnerabilities :\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine\n WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the\n routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause\n impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible\n during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch\n uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application\n reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-25666)\n\n - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it\n searches for `'dc:format=\\'image/dng\\'` within `profile` due to improper string handling, when a crafted\n input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to\n remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-25667)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that\n can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the\n colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass\n invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to\n MagickMin() to ensure the proper value is used. This could impact application availability when a\n specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-25674)\n\n - In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations\n performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow\n and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative\n impact to application availability or other problems related to undefined behavior, in cases where\n ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the\n pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-25675)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and\n InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained\n pixel offset calculations which were being used with the floor() function. These calculations produced\n undefined behavior in the form of out-of-range and integer overflows, as identified by\n UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is\n able to supply a crafted input file to be processed by ImageMagick. These issues could impact application\n availability or potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker\n who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form\n of values outside the range of type `unsigned char` and math division by zero. This would most likely lead\n to an impact to application availability, but could potentially cause other problems related to undefined\n behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range\n of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27751)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values,\n which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact\n to application availability or cause a denial of service. It was originally reported that the issues were\n in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves\n issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This\n flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return\n overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the\n patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be\n within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to\n 6.9.10-69 and 7.0.8-69. (CVE-2020-27754)\n\n - in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because\n the code which checks for the proper image depth size does not reset the size in the event there is an\n invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak\n can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to\n application reliability, such as denial of service. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27755)\n\n - In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-\n by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input\n file processed by ImageMagick and could impact application availability. The patch uses multiplication in\n addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions.\n This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27756)\n\n - A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to\n undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be\n triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat\n Product Security marked this as Low because although it could potentially lead to an impact to application\n availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27757)\n\n - A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n long long`. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27758)\n\n - In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned,\n which in some cases caused a value outside the range of type `int` to be returned. The flaw could be\n triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product\n Security marked this as Low severity because although it could potentially lead to an impact to\n application availability, no specific impact was shown in this case. This flaw affects ImageMagick\n versions prior to 7.0.8-68. (CVE-2020-27759)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a\n divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an\n impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-\n zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to\n values outside the range of representable type `unsigned long` undefined behavior when a crafted input\n file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat\n Product Security marked the Severity as Low because although it could potentially lead to an impact to\n application availability, no specific impact was shown in this case. This flaw affects ImageMagick\n versions prior to ImageMagick 7.0.9-0. (CVE-2020-27761)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n char`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick\n 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27763)\n\n - In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should\n have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input\n file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it\n could potentially lead to an impact to application availability, no specific impact was shown in this\n case. This flaw affects ImageMagick versions prior to 6.9.10-69. (CVE-2020-27764)\n\n - A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27765)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types\n `float` and `unsigned char`. This would most likely lead to an impact to application availability, but\n could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-27767)\n\n - In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at\n MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27768)\n\n - In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type\n 'float' at MagickCore/quantize.c. (CVE-2020-27769)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in\n SubstituteString(), causing potential impact to application availability. This could be triggered by a\n crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27770)\n\n - In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could\n result in values outside the range of representable for the unsigned char type. The patch casts the return\n value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered\n when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity\n because although it could potentially lead to an impact to application availability, no specific impact\n was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27771)\n\n - A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n int`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-27772)\n\n - A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that\n is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of\n type `unsigned char` or division by zero. This would most likely lead to an impact to application\n availability, but could potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-27773)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n unsigned char. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27775)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n unsigned long. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27776)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security\nadvisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional\nissues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2022-1536\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c481a0b6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ImageMagick packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-20246\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/12/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/04/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nvar uvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nvar sp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nvar flag = 0;\n\nvar pkgs = [\n \"ImageMagick-6.9.10.67-1.h8.eulerosv2r7\",\n \"ImageMagick-c++-6.9.10.67-1.h8.eulerosv2r7\",\n \"ImageMagick-libs-6.9.10.67-1.h8.eulerosv2r7\",\n \"ImageMagick-perl-6.9.10.67-1.h8.eulerosv2r7\"\n];\n\nforeach (var pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ImageMagick\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:29:50", "description": "According to the versions of the ImageMagick packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found. (CVE-2018-16750)\n\n - The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read. (CVE-2018-8960)\n\n - ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file. (CVE-2018-9133)\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25666)\n\n - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `'dc:format=\\'image/dng\\'` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25667)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25674)\n\n - In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-25675)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27751)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. (CVE-2020-27754)\n\n - in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27755)\n\n - In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide- by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions.\n This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27756)\n\n - A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27757)\n\n - A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27758)\n\n - In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27759)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by- zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0. (CVE-2020-27761)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27763)\n\n - In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69. (CVE-2020-27764)\n\n - A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27765)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27767)\n\n - In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27768)\n\n - In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c. (CVE-2020-27769)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27770)\n\n - In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27771)\n\n - A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-27772)\n\n - A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27773)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27775)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27776)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2022-05-26T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : ImageMagick (EulerOS-SA-2022-1731)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-16750", "CVE-2018-8960", "CVE-2018-9133", "CVE-2020-25665", "CVE-2020-25666", "CVE-2020-25667", "CVE-2020-25674", "CVE-2020-25675", "CVE-2020-25676", "CVE-2020-27750", "CVE-2020-27751", "CVE-2020-27753", "CVE-2020-27754", "CVE-2020-27755", "CVE-2020-27756", "CVE-2020-27757", "CVE-2020-27758", "CVE-2020-27759", "CVE-2020-27760", "CVE-2020-27761", "CVE-2020-27762", "CVE-2020-27763", "CVE-2020-27764", "CVE-2020-27765", "CVE-2020-27767", "CVE-2020-27768", "CVE-2020-27769", "CVE-2020-27770", "CVE-2020-27771", "CVE-2020-27772", "CVE-2020-27773", "CVE-2020-27775", "CVE-2020-27776", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2022-05-26T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:imagemagick", "p-cpe:/a:huawei:euleros:imagemagick-c%2b%2b", "p-cpe:/a:huawei:euleros:imagemagick-libs", "p-cpe:/a:huawei:euleros:imagemagick-perl", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2022-1731.NASL", "href": "https://www.tenable.com/plugins/nessus/161569", "sourceData": "##\n# (C) Tenable, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(161569);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/26\");\n\n script_cve_id(\n \"CVE-2018-8960\",\n \"CVE-2018-9133\",\n \"CVE-2018-16750\",\n \"CVE-2020-25665\",\n \"CVE-2020-25666\",\n \"CVE-2020-25667\",\n \"CVE-2020-25674\",\n \"CVE-2020-25675\",\n \"CVE-2020-25676\",\n \"CVE-2020-27750\",\n \"CVE-2020-27751\",\n \"CVE-2020-27753\",\n \"CVE-2020-27754\",\n \"CVE-2020-27755\",\n \"CVE-2020-27756\",\n \"CVE-2020-27757\",\n \"CVE-2020-27758\",\n \"CVE-2020-27759\",\n \"CVE-2020-27760\",\n \"CVE-2020-27761\",\n \"CVE-2020-27762\",\n \"CVE-2020-27763\",\n \"CVE-2020-27764\",\n \"CVE-2020-27765\",\n \"CVE-2020-27767\",\n \"CVE-2020-27768\",\n \"CVE-2020-27769\",\n \"CVE-2020-27770\",\n \"CVE-2020-27771\",\n \"CVE-2020-27772\",\n \"CVE-2020-27773\",\n \"CVE-2020-27775\",\n \"CVE-2020-27776\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20246\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : ImageMagick (EulerOS-SA-2022-1731)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ImageMagick packages installed, the EulerOS installation on the remote host is affected\nby the following vulnerabilities :\n\n - In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c\n was found. (CVE-2018-16750)\n\n - The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory\n allocation, leading to a heap-based buffer over-read. (CVE-2018-8960)\n\n - ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions\n (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could\n leverage this vulnerability to cause a denial of service via a crafted tiff file. (CVE-2018-9133)\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine\n WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the\n routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause\n impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible\n during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch\n uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application\n reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-25666)\n\n - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it\n searches for `'dc:format=\\'image/dng\\'` within `profile` due to improper string handling, when a crafted\n input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to\n remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-25667)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that\n can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the\n colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass\n invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to\n MagickMin() to ensure the proper value is used. This could impact application availability when a\n specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-25674)\n\n - In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations\n performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow\n and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative\n impact to application availability or other problems related to undefined behavior, in cases where\n ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the\n pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-25675)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and\n InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained\n pixel offset calculations which were being used with the floor() function. These calculations produced\n undefined behavior in the form of out-of-range and integer overflows, as identified by\n UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is\n able to supply a crafted input file to be processed by ImageMagick. These issues could impact application\n availability or potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker\n who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form\n of values outside the range of type `unsigned char` and math division by zero. This would most likely lead\n to an impact to application availability, but could potentially cause other problems related to undefined\n behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range\n of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27751)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values,\n which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact\n to application availability or cause a denial of service. It was originally reported that the issues were\n in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves\n issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This\n flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return\n overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the\n patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be\n within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to\n 6.9.10-69 and 7.0.8-69. (CVE-2020-27754)\n\n - in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because\n the code which checks for the proper image depth size does not reset the size in the event there is an\n invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak\n can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to\n application reliability, such as denial of service. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27755)\n\n - In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-\n by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input\n file processed by ImageMagick and could impact application availability. The patch uses multiplication in\n addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions.\n This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27756)\n\n - A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to\n undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be\n triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat\n Product Security marked this as Low because although it could potentially lead to an impact to application\n availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27757)\n\n - A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n long long`. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27758)\n\n - In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned,\n which in some cases caused a value outside the range of type `int` to be returned. The flaw could be\n triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product\n Security marked this as Low severity because although it could potentially lead to an impact to\n application availability, no specific impact was shown in this case. This flaw affects ImageMagick\n versions prior to 7.0.8-68. (CVE-2020-27759)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a\n divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an\n impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-\n zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to\n values outside the range of representable type `unsigned long` undefined behavior when a crafted input\n file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat\n Product Security marked the Severity as Low because although it could potentially lead to an impact to\n application availability, no specific impact was shown in this case. This flaw affects ImageMagick\n versions prior to ImageMagick 7.0.9-0. (CVE-2020-27761)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n char`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick\n 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27763)\n\n - In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should\n have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input\n file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it\n could potentially lead to an impact to application availability, no specific impact was shown in this\n case. This flaw affects ImageMagick versions prior to 6.9.10-69. (CVE-2020-27764)\n\n - A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27765)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types\n `float` and `unsigned char`. This would most likely lead to an impact to application availability, but\n could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-27767)\n\n - In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at\n MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27768)\n\n - In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type\n 'float' at MagickCore/quantize.c. (CVE-2020-27769)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in\n SubstituteString(), causing potential impact to application availability. This could be triggered by a\n crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27770)\n\n - In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could\n result in values outside the range of representable for the unsigned char type. The patch casts the return\n value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered\n when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity\n because although it could potentially lead to an impact to application availability, no specific impact\n was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27771)\n\n - A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n int`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-27772)\n\n - A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that\n is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of\n type `unsigned char` or division by zero. This would most likely lead to an impact to application\n availability, but could potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-27773)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n unsigned char. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27775)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n unsigned long. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27776)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security\nadvisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional\nissues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2022-1731\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ebedc052\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ImageMagick packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8960\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/05/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nvar uvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nvar sp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nvar flag = 0;\n\nvar pkgs = [\n \"ImageMagick-6.9.9.38-1.h17\",\n \"ImageMagick-c++-6.9.9.38-1.h17\",\n \"ImageMagick-libs-6.9.9.38-1.h17\",\n \"ImageMagick-perl-6.9.9.38-1.h17\"\n];\n\nforeach (var pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ImageMagick\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:43:45", "description": "According to the versions of the ImageMagick packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.\n (CVE-2018-16323)\n\n - In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found. (CVE-2018-16750)\n\n - In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. (CVE-2018-20467)\n\n - ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file. (CVE-2018-9133)\n\n - In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.\n (CVE-2019-14980)\n\n - In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.\n (CVE-2019-14981)\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25666)\n\n - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `'dc:format=\\'image/dng\\'` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25667)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25674)\n\n - In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-25675)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27751)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69. (CVE-2020-27754)\n\n - in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27755)\n\n - In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide- by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions.\n This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27756)\n\n - A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27757)\n\n - A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27758)\n\n - In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27759)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by- zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0. (CVE-2020-27761)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27763)\n\n - In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69. (CVE-2020-27764)\n\n - A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27765)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27767)\n\n - In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27768)\n\n - In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c. (CVE-2020-27769)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27770)\n\n - In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27771)\n\n - A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-27772)\n\n - A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27773)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27774)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27775)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27776)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2022-04-25T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP8 : ImageMagick (EulerOS-SA-2022-1570)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-16323", "CVE-2018-16750", "CVE-2018-20467", "CVE-2018-9133", "CVE-2019-14980", "CVE-2019-14981", "CVE-2020-25665", "CVE-2020-25666", "CVE-2020-25667", "CVE-2020-25674", "CVE-2020-25675", "CVE-2020-25676", "CVE-2020-27750", "CVE-2020-27751", "CVE-2020-27753", "CVE-2020-27754", "CVE-2020-27755", "CVE-2020-27756", "CVE-2020-27757", "CVE-2020-27758", "CVE-2020-27759", "CVE-2020-27760", "CVE-2020-27761", "CVE-2020-27762", "CVE-2020-27763", "CVE-2020-27764", "CVE-2020-27765", "CVE-2020-27767", "CVE-2020-27768", "CVE-2020-27769", "CVE-2020-27770", "CVE-2020-27771", "CVE-2020-27772", "CVE-2020-27773", "CVE-2020-27774", "CVE-2020-27775", "CVE-2020-27776", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2022-04-26T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:imagemagick", "p-cpe:/a:huawei:euleros:imagemagick-c%2b%2b", "p-cpe:/a:huawei:euleros:imagemagick-libs", "p-cpe:/a:huawei:euleros:imagemagick-perl", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2022-1570.NASL", "href": "https://www.tenable.com/plugins/nessus/160159", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(160159);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/26\");\n\n script_cve_id(\n \"CVE-2018-9133\",\n \"CVE-2018-16323\",\n \"CVE-2018-16750\",\n \"CVE-2018-20467\",\n \"CVE-2019-14980\",\n \"CVE-2019-14981\",\n \"CVE-2020-25665\",\n \"CVE-2020-25666\",\n \"CVE-2020-25667\",\n \"CVE-2020-25674\",\n \"CVE-2020-25675\",\n \"CVE-2020-25676\",\n \"CVE-2020-27750\",\n \"CVE-2020-27751\",\n \"CVE-2020-27753\",\n \"CVE-2020-27754\",\n \"CVE-2020-27755\",\n \"CVE-2020-27756\",\n \"CVE-2020-27757\",\n \"CVE-2020-27758\",\n \"CVE-2020-27759\",\n \"CVE-2020-27760\",\n \"CVE-2020-27761\",\n \"CVE-2020-27762\",\n \"CVE-2020-27763\",\n \"CVE-2020-27764\",\n \"CVE-2020-27765\",\n \"CVE-2020-27767\",\n \"CVE-2020-27768\",\n \"CVE-2020-27769\",\n \"CVE-2020-27770\",\n \"CVE-2020-27771\",\n \"CVE-2020-27772\",\n \"CVE-2020-27773\",\n \"CVE-2020-27774\",\n \"CVE-2020-27775\",\n \"CVE-2020-27776\",\n \"CVE-2021-20241\",\n \"CVE-2021-20243\",\n \"CVE-2021-20244\",\n \"CVE-2021-20246\"\n );\n script_xref(name:\"IAVB\", value:\"2020-B-0076-S\");\n script_xref(name:\"IAVB\", value:\"2021-B-0017-S\");\n\n script_name(english:\"EulerOS 2.0 SP8 : ImageMagick (EulerOS-SA-2022-1570)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ImageMagick packages installed, the EulerOS installation on the remote host is affected\nby the following vulnerabilities :\n\n - ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an\n XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process\n that includes sensitive information, that information sometimes can be leaked via the image data.\n (CVE-2018-16323)\n\n - In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c\n was found. (CVE-2018-16750)\n\n - In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang,\n with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial\n of service via a crafted file. (CVE-2018-20467)\n\n - ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions\n (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could\n leverage this vulnerability to cause a denial of service via a crafted tiff file. (CVE-2018-9133)\n\n - In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in\n the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.\n (CVE-2019-14980)\n\n - In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in\n the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.\n (CVE-2019-14981)\n\n - The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine\n WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the\n routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause\n impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-25665)\n\n - There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible\n during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch\n uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application\n reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-25666)\n\n - TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it\n searches for `'dc:format=\\'image/dng\\'` within `profile` due to improper string handling, when a crafted\n input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to\n remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-25667)\n\n - WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that\n can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the\n colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass\n invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to\n MagickMin() to ensure the proper value is used. This could impact application availability when a\n specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-25674)\n\n - In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations\n performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow\n and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative\n impact to application availability or other problems related to undefined behavior, in cases where\n ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the\n pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-25675)\n\n - In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and\n InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained\n pixel offset calculations which were being used with the floor() function. These calculations produced\n undefined behavior in the form of out-of-range and integer overflows, as identified by\n UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is\n able to supply a crafted input file to be processed by ImageMagick. These issues could impact application\n availability or potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-25676)\n\n - A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker\n who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form\n of values outside the range of type `unsigned char` and math division by zero. This would most likely lead\n to an impact to application availability, but could potentially cause other problems related to undefined\n behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27750)\n\n - A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range\n of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27751)\n\n - There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values,\n which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact\n to application availability or cause a denial of service. It was originally reported that the issues were\n in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves\n issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This\n flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27753)\n\n - In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return\n overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the\n patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be\n within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to\n 6.9.10-69 and 7.0.8-69. (CVE-2020-27754)\n\n - in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because\n the code which checks for the proper image depth size does not reset the size in the event there is an\n invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak\n can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to\n application reliability, such as denial of service. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27755)\n\n - In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-\n by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input\n file processed by ImageMagick and could impact application availability. The patch uses multiplication in\n addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions.\n This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27756)\n\n - A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to\n undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be\n triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat\n Product Security marked this as Low because although it could potentially lead to an impact to application\n availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27757)\n\n - A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n long long`. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27758)\n\n - In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned,\n which in some cases caused a value outside the range of type `int` to be returned. The flaw could be\n triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product\n Security marked this as Low severity because although it could potentially lead to an impact to\n application availability, no specific impact was shown in this case. This flaw affects ImageMagick\n versions prior to 7.0.8-68. (CVE-2020-27759)\n\n - In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a\n divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an\n impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-\n zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.\n (CVE-2020-27760)\n\n - WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to\n values outside the range of representable type `unsigned long` undefined behavior when a crafted input\n file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat\n Product Security marked the Severity as Low because although it could potentially lead to an impact to\n application availability, no specific impact was shown in this case. This flaw affects ImageMagick\n versions prior to ImageMagick 7.0.9-0. (CVE-2020-27761)\n\n - A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n char`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick\n 7.0.8-68. (CVE-2020-27762)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68. (CVE-2020-27763)\n\n - In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should\n have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input\n file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it\n could potentially lead to an impact to application availability, no specific impact was shown in this\n case. This flaw affects ImageMagick versions prior to 6.9.10-69. (CVE-2020-27764)\n\n - A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would\n most likely lead to an impact to application availability, but could potentially cause other problems\n related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27765)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types\n `float` and `unsigned char`. This would most likely lead to an impact to application availability, but\n could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick\n versions prior to 7.0.9-0. (CVE-2020-27767)\n\n - In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at\n MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27768)\n\n - In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type\n 'float' at MagickCore/quantize.c. (CVE-2020-27769)\n\n - Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in\n SubstituteString(), causing potential impact to application availability. This could be triggered by a\n crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to\n 7.0.8-68. (CVE-2020-27770)\n\n - In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could\n result in values outside the range of representable for the unsigned char type. The patch casts the return\n value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered\n when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity\n because although it could potentially lead to an impact to application availability, no specific impact\n was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0. (CVE-2020-27771)\n\n - A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned\n int`. This would most likely lead to an impact to application availability, but could potentially cause\n other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.\n (CVE-2020-27772)\n\n - A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that\n is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of\n type `unsigned char` or division by zero. This would most likely lead to an impact to application\n availability, but could potentially cause other problems related to undefined behavior. This flaw affects\n ImageMagick versions prior to 7.0.9-0. (CVE-2020-27773)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type\n `ssize_t`. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27774)\n\n - A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n unsigned char. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27775)\n\n - A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type\n unsigned long. This would most likely lead to an impact to application availability, but could potentially\n cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to\n 7.0.9-0. (CVE-2020-27776)\n\n - A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed\n by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat\n from this vulnerability is to system availability. (CVE-2021-20241)\n\n - A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20243)\n\n - A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file\n that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero.\n The highest threat from this vulnerability is to system availability. (CVE-2021-20244)\n\n - A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is\n processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The\n highest threat from this vulnerability is to system availability. (CVE-2021-20246)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security\nadvisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional\nissues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2022-1570\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e927592b\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ImageMagick packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-16323\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/04/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ImageMagick-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nvar uvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nvar sp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nvar flag = 0;\n\nvar pkgs = [\n \"ImageMagick-6.9.9.38-3.h24.eulerosv2r8\",\n \"ImageMagick-c++-6.9.9.38-3.h24.eulerosv2r8\",\n \"ImageMagick-libs-6.9.9.38-3.h24.eulerosv2r8\",\n \"ImageMagick-perl-6.9.9.38-3.h24.eulerosv2r8\"\n];\n\nforeach (var pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ImageMagick\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "mageia": [{"lastseen": "2023-05-29T14:38:48", "description": "A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability (CVE-2021-20241). A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability (CVE-2021-20243). A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability (CVE-2021-20244). A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability (CVe-2021-20246). Note that abydos, blender, converseen, cuneiform-linux, digikam, kxxstich, libopenshot, pfstools, php-imagick, spectacle, synfig, xine-lib1.2, mgba, windowmaker, zbar and transcode (and tainted conter-parts) have been rebuilt. \n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-03-27T14:27:02", "type": "mageia", "title": "Updated imagemagick packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2021-03-27T14:26:59", "id": "MGASA-2021-0156", "href": "https://advisories.mageia.org/MGASA-2021-0156.html", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2023-06-06T15:28:27", "description": "\n\nCVE reports:\n\nSeveral vulnerabilities have been discovered in ImageMagick:\n\nCVE-2021-20313: A flaw was found in ImageMagick in versions before 7.0.11.\n\t A potential cipher leak when the calculate signatures in TransformSignature is possible.\nCVE-2021-20312: A flaw was found in ImageMagick in versions 7.0.11,\n\t where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger\n\t undefined behavior via a crafted image file that is submitted by an attacker and\n\t processed by an application using ImageMagick.\nCVE-2021-20311: A flaw was found in ImageMagick in versions before 7.0.11,\n\t where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c\n\t may trigger undefined behavior via a crafted image file that is submitted by an\n\t attacker processed by an application using ImageMagick.\nCVE-2021-20310: A flaw was found in ImageMagick in versions before 7.0.11,\n\t where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger\n\t undefined behavior via a crafted image file that is submitted by an attacker\n\t and processed by an application using ImageMagick.\nCVE-2021-20309: A flaw was found in ImageMagick in versions before 7.0.11,\n\t where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger\n\t undefined behavior via a crafted image file submitted to an application using ImageMagick.\nAnd several others\u2026\n\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-10-27T00:00:00", "type": "freebsd", "title": "ImageMagick7 -- multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-27829", "CVE-2020-29599", "CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20310", "CVE-2021-20311", "CVE-2021-20312", "CVE-2021-20313"], "modified": "2020-10-27T00:00:00", "id": "A7C60AF1-B3F1-11EB-A5F7-A0F3C100AE18", "href": "https://vuxml.freebsd.org/freebsd/a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "osv": [{"lastseen": "2023-06-28T06:30:51", "description": "\nMultiple vulnerabilities were fixed in imagemagick, a software suite,\nused for editing and manipulating digital images.\n\n\n* [CVE-2021-20176](https://security-tracker.debian.org/tracker/CVE-2021-20176)\nA divide by zero was found in gem.c file.\n* [CVE-2021-20241](https://security-tracker.debian.org/tracker/CVE-2021-20241)\nA divide by zero was found in jp2 coder.\n* [CVE-2021-20243](https://security-tracker.debian.org/tracker/CVE-2021-20243)\nA divide by zero was found in dcm coder.\n* [CVE-2021-20244](https://security-tracker.debian.org/tracker/CVE-2021-20244)\nA divide by zero was found in fx.c.\n* [CVE-2021-20245](https://security-tracker.debian.org/tracker/CVE-2021-20245)\nA divide by zero was found in webp coder.\n* [CVE-2021-20246](https://security-tracker.debian.org/tracker/CVE-2021-20246)\nA divide by zero was found in resample.c.\n* [CVE-2021-20309](https://security-tracker.debian.org/tracker/CVE-2021-20309)\nA divide by zero was found in WaveImage.c\n* [CVE-2021-20312](https://security-tracker.debian.org/tracker/CVE-2021-20312)\nAn integer overflow was found in WriteTHUMBNAILImage()\n of coders/thumbnail.c\n* [CVE-2021-20313](https://security-tracker.debian.org/tracker/CVE-2021-20313)\nA potential cipher leak was found when the calculate\n signatures in TransformSignature().\n* [CVE-2021-39212](https://security-tracker.debian.org/tracker/CVE-2021-39212)\nA policy bypass was found for postscript files.\n* [CVE-2022-28463](https://security-tracker.debian.org/tracker/CVE-2022-28463)\nA bufer overflow was found in buffer overflow in cin coder.\n* [CVE-2022-32545](https://security-tracker.debian.org/tracker/CVE-2022-32545)\nA undefined behavior (conversion outside the range of\n representable values of type unsigned char) was found in psd\n file handling.\n* [CVE-2022-32546](https://security-tracker.debian.org/tracker/CVE-2022-32546)\nA undefined behavior (conversion outside the range of\n representable values of type long) was found in pcl\n file handling.\n* [CVE-2022-32547](https://security-tracker.debian.org/tracker/CVE-2022-32547)\nAn unaligned access was found in property.c\n\n\nFor Debian 10 buster, these problems have been fixed in version\n8:6.9.10.23+dfsg-2.1+deb10u5.\n\n\nWe recommend that you upgrade your imagemagick packages.\n\n\nFor the detailed security status of imagemagick please refer to\nits security tracker page at:\n<https://security-tracker.debian.org/tracker/imagemagick>\n\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: <https://wiki.debian.org/LTS>\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-05-21T00:00:00", "type": "osv", "title": "imagemagick - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-39212", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547"], "modified": "2023-06-28T06:30:34", "id": "OSV:DLA-3429-1", "href": "https://osv.dev/vulnerability/DLA-3429-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-07-21T08:15:39", "description": "\nMultiple security vulnerabilities were found in Imagemagick. Missing or\nincomplete input sanitizing may lead to undefined behavior which can result\nin denial of service (application crash) or other unspecified impact.\n\n\nFor Debian 9 stretch, these problems have been fixed in version\n8:6.9.7.4+dfsg-11+deb9u12.\n\n\nWe recommend that you upgrade your imagemagick packages.\n\n\nFor the detailed security status of imagemagick please refer to\nits security tracker page at:\n<https://security-tracker.debian.org/tracker/imagemagick>\n\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: <https://wiki.debian.org/LTS>\n\n\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-03-23T00:00:00", "type": "osv", "title": "imagemagick - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-27771", "CVE-2020-27761", "CVE-2020-27774", "CVE-2020-27768", "CVE-2020-27776", "CVE-2020-27754", "CVE-2020-27772", "CVE-2020-27770", "CVE-2020-27762", "CVE-2021-20241", "CVE-2020-27766", "CVE-2020-25675", "CVE-2020-27764", "CVE-2020-27758", "CVE-2020-27759", "CVE-2020-27769", "CVE-2020-27767", "CVE-2020-25666", "CVE-2021-20246", "CVE-2021-20176", "CVE-2020-27757", "CVE-2020-27775", "CVE-2021-20244", "CVE-2020-25676"], "modified": "2022-07-21T05:53:40", "id": "OSV:DLA-2602-1", "href": "https://osv.dev/vulnerability/DLA-2602-1", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2023-06-23T15:18:38", "description": "## Releases\n\n * Ubuntu 16.04 ESM\n\n## Packages\n\n * imagemagick \\- Image manipulation programs and library\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing XPM image data or large images. If a user or automated \nsystem using ImageMagick were tricked into opening a specially crafted \nimage, an attacker could exploit this to cause a denial of service or \npossibly execute code with the privileges of the user invoking the program. \n(CVE-2020-19667, CVE-2017-13144)\n\nSuhwan Song discovered that ImageMagick incorrectly handled memory \nwhen processing PNG,PALM,MIFF image data. If a user or automated system \nusing ImageMagick were tricked into opening a specially crafted image, \nan attacker could exploit this to cause a denial of service or possibly \nexecute code with the privileges of the user invoking the program. \n(CVE-2020-25664, CVE-2020-25665, CVE-2020-25674, CVE-2020-27753)\n\nSuhwan Song discovered that ImageMagick incorrectly handled certain values \nwhen processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. \n(CVE-2020-25676, CVE-2020-27750, CVE-2020-27760, CVE-2020-27762, \nCVE-2020-27766, CVE-2020-27770)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain values \nwhen processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. \n(CVE-2021-20176, CVE-2021-20241, CVE-2021-20243)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-03-18T00:00:00", "type": "ubuntu", "title": "ImageMagick vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-13144", "CVE-2020-19667", "CVE-2020-25664", "CVE-2020-25665", "CVE-2020-25674", "CVE-2020-25676", "CVE-2020-27750", "CVE-2020-27753", "CVE-2020-27760", "CVE-2020-27762", "CVE-2020-27766", "CVE-2020-27770", "CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20243"], "modified": "2022-03-18T00:00:00", "id": "USN-5335-1", "href": "https://ubuntu.com/security/notices/USN-5335-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-07-21T16:56:30", "description": "## Releases\n\n * Ubuntu 22.10 \n * Ubuntu 18.04 ESM\n * Ubuntu 16.04 ESM\n * Ubuntu 14.04 ESM\n\n## Packages\n\n * imagemagick \\- Image manipulation programs and library\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing PDF files. If a user or automated system using ImageMagick \nwere tricked into opening a specially crafted PDF file, an attacker could \nexploit this to cause a denial of service. This issue only affected Ubuntu \n14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain \nvalues when processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. This issue only \naffected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain \nvalues when processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. This issue only \naffected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. \n(CVE-2021-20243)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing visual effects based image files. By tricking a user into \nopening a specially crafted image file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n22.10. (CVE-2021-20244)\n\nIt was discovered that ImageMagick could be made to divide by zero when \nprocessing crafted files. By tricking a user into opening a specially \ncrafted image file, an attacker could crash the application causing a \ndenial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen performing resampling operations. By tricking a user into opening \na specially crafted image file, an attacker could crash the application \ncausing a denial of service. This issue only affected Ubuntu 22.10. \n(CVE-2021-20246)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing visual effects based image files. By tricking a user into \nopening a specially crafted image file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n22.10. (CVE-2021-20309)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing thumbnail image data. By tricking a user into opening \na specially crafted image file, an attacker could crash the application \ncausing a denial of service. This issue only affected Ubuntu 22.10. \n(CVE-2021-20312)\n\nIt was discovered that ImageMagick incorrectly handled memory cleanup \nwhen performing certain cryptographic operations. Under certain conditions \nsensitive cryptographic information could be disclosed. This issue only \naffected Ubuntu 22.10. (CVE-2021-20313)\n\nIt was discovered that ImageMagick did not properly manage memory under \ncertain circumstances. If a user were tricked into opening a specially \ncrafted file using the convert command, an attacker could possibly use \nthis issue to cause ImageMagick to crash, resulting in a denial of \nservice. This issue only affected Ubuntu 22.10. (CVE-2021-3574)\n\nIt was discovered that ImageMagick did not use the correct rights when \nspecifically excluded by a module policy. An attacker could use this issue \nto read and write certain restricted files. This issue only affected \nUbuntu 22.10. (CVE-2021-39212)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing specially crafted SVG files. By tricking a user into \nopening a specially crafted SVG file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n22.10. (CVE-2021-4219)\n\nIt was discovered that ImageMagick did not properly manage memory under \ncertain circumstances. If a user were tricked into opening a specially \ncrafted DICOM file, an attacker could possibly use this issue to cause \nImageMagick to crash, resulting in a denial of servicei, or expose sensitive \ninformation. This issue only affected Ubuntu 22.10. (CVE-2022-1114)\n\nIt was discovered that ImageMagick incorrectly handled memory under \ncertain circumstances. If a user were tricked into opening a specially \ncrafted image file, an attacker could possibly exploit this issue to cause \na denial of service or other unspecified impact. This issue only affected \nUbuntu 22.10. (CVE-2022-28463)\n\nIt was discovered that ImageMagick incorrectly handled certain values. \nIf a user were tricked into processing a specially crafted image file, \nan attacker could possibly exploit this issue to cause a denial of service \nor other unspecified impact. This issue only affected Ubuntu 14.04 ESM, \nUbuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546)\n\nIt was discovered that ImageMagick incorrectly handled memory under \ncertain circumstances. If a user were tricked into processing a specially \ncrafted image file, an attacker could possibly exploit this issue to cause \na denial of service or other unspecified impact. This issue only affected \nUbuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-11-24T00:00:00", "type": "ubuntu", "title": "ImageMagick vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20224", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-3574", "CVE-2021-39212", "CVE-2021-4219", "CVE-2022-1114", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547"], "modified": "2022-11-24T00:00:00", "id": "USN-5736-1", "href": "https://ubuntu.com/security/notices/USN-5736-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-06-17T15:19:08", "description": "## Releases\n\n * Ubuntu 22.04 LTS\n * Ubuntu 20.04 LTS\n\n## Packages\n\n * imagemagick \\- Image manipulation programs and library\n\nUSN-5736-1 fixed vulnerabilities in ImageMagick. This update provides the \ncorresponding updates for Ubuntu 20.04 ESM and Ubuntu 22.04 ESM. One of the \nissues, CVE-2021-20224, only affected Ubuntu 20.04 ESM, while \nCVE-2021-20245, CVE-2021-3574, CVE-2021-4219 and CVE-2022-1114 only \naffected Ubuntu 22.04 ESM.\n\nOriginal advisory details:\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing PDF files. If a user or automated system using ImageMagick \nwere tricked into opening a specially crafted PDF file, an attacker could \nexploit this to cause a denial of service. This issue only affected Ubuntu \n14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain \nvalues when processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. This issue only \naffected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain \nvalues when processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. This issue only \naffected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. \n(CVE-2021-20243)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing visual effects based image files. By tricking a user into \nopening a specially crafted image file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n22.10. (CVE-2021-20244)\n\nIt was discovered that ImageMagick could be made to divide by zero when \nprocessing crafted files. By tricking a user into opening a specially \ncrafted image file, an attacker could crash the application causing a \ndenial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen performing resampling operations. By tricking a user into opening \na specially crafted image file, an attacker could crash the application \ncausing a denial of service. This issue only affected Ubuntu 22.10. \n(CVE-2021-20246)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing visual effects based image files. By tricking a user into \nopening a specially crafted image file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n22.10. (CVE-2021-20309)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing thumbnail image data. By tricking a user into opening \na specially crafted image file, an attacker could crash the application \ncausing a denial of service. This issue only affected Ubuntu 22.10. \n(CVE-2021-20312)\n\nIt was discovered that ImageMagick incorrectly handled memory cleanup \nwhen performing certain cryptographic operations. Under certain conditions \nsensitive cryptographic information could be disclosed. This issue only \naffected Ubuntu 22.10. (CVE-2021-20313)\n\nIt was discovered that ImageMagick did not properly manage memory under \ncertain circumstances. If a user were tricked into opening a specially \ncrafted file using the convert command, an attacker could possibly use \nthis issue to cause ImageMagick to crash, resulting in a denial of \nservice. This issue only affected Ubuntu 22.10. (CVE-2021-3574)\n\nIt was discovered that ImageMagick did not use the correct rights when \nspecifically excluded by a module policy. An attacker could use this issue \nto read and write certain restricted files. This issue only affected \nUbuntu 22.10. (CVE-2021-39212)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing specially crafted SVG files. By tricking a user into \nopening a specially crafted SVG file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n22.10. (CVE-2021-4219)\n\nIt was discovered that ImageMagick did not properly manage memory under \ncertain circumstances. If a user were tricked into opening a specially \ncrafted DICOM file, an attacker could possibly use this issue to cause \nImageMagick to crash, resulting in a denial of service, or expose sensitive \ninformation. This issue only affected Ubuntu 22.10. (CVE-2022-1114)\n\nIt was discovered that ImageMagick incorrectly handled memory under \ncertain circumstances. If a user were tricked into opening a specially \ncrafted image file, an attacker could possibly exploit this issue to cause \na denial of service or other unspecified impact. This issue only affected \nUbuntu 22.10. (CVE-2022-28463)\n\nIt was discovered that ImageMagick incorrectly handled certain values. \nIf a user were tricked into processing a specially crafted image file, \nan attacker could possibly exploit this issue to cause a denial of service \nor other unspecified impact. This issue only affected Ubuntu 14.04 ESM, \nUbuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546)\n\nIt was discovered that ImageMagick incorrectly handled memory under \ncertain circumstances. If a user were tricked into processing a specially \ncrafted image file, an attacker could possibly exploit this issue to cause \na denial of service or other unspecified impact. This issue only affected \nUbuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-11-24T00:00:00", "type": "ubuntu", "title": "ImageMagick vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20224", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-3574", "CVE-2021-39212", "CVE-2021-4219", "CVE-2022-1114", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547"], "modified": "2022-11-24T00:00:00", "id": "USN-5736-2", "href": "https://ubuntu.com/security/notices/USN-5736-2", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-09-24T02:12:20", "description": "## Releases\n\n * Ubuntu 23.04 \n * Ubuntu 22.10 \n * Ubuntu 22.04 LTS\n * Ubuntu 20.04 LTS\n * Ubuntu 18.04 ESM\n * Ubuntu 16.04 ESM\n\n## Packages\n\n * imagemagick \\- Image manipulation programs and library\n\nIt was discovered that ImageMagick incorrectly handled the \"-authenticate\" \noption for password-protected PDF files. An attacker could possibly use \nthis issue to inject additional shell commands and perform arbitrary code \nexecution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing PDF files. If a user or automated system using ImageMagick \nwere tricked into opening a specially crafted PDF file, an attacker could \nexploit this to cause a denial of service. This issue only affected Ubuntu \n20.04 LTS. (CVE-2021-20224)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain \nvalues when processing image data. If a user or automated system using \nImageMagick were tricked into opening a specially crafted image, an \nattacker could exploit this to cause a denial of service. This issue only \naffected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing visual effects based image files. By tricking a user into \nopening a specially crafted image file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n20.04 LTS. (CVE-2021-20244, CVE-2021-20309)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen performing resampling operations. By tricking a user into opening \na specially crafted image file, an attacker could crash the application \ncausing a denial of service. This issue only affected Ubuntu 20.04 LTS. \n(CVE-2021-20246)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing thumbnail image data. By tricking a user into opening \na specially crafted image file, an attacker could crash the application \ncausing a denial of service. This issue only affected Ubuntu 20.04 LTS. \n(CVE-2021-20312)\n\nIt was discovered that ImageMagick incorrectly handled memory cleanup \nwhen performing certain cryptographic operations. Under certain conditions \nsensitive cryptographic information could be disclosed. This issue only \naffected Ubuntu 20.04 LTS. (CVE-2021-20313)\n\nIt was discovered that ImageMagick did not use the correct rights when \nspecifically excluded by a module policy. An attacker could use this issue \nto read and write certain restricted files. This issue only affected Ubuntu \n20.04 LTS. (CVE-2021-39212)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain \ncircumstances. If a user were tricked into opening a specially crafted \nimage file, an attacker could possibly exploit this issue to cause a denial \nof service or other unspecified impact. This issue only affected Ubuntu \n20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain \ncircumstances. If a user were tricked into opening a specially crafted \nimage file, an attacker could possibly exploit this issue to cause a denial \nof service or other unspecified impact. This issue only affected Ubuntu \n22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906, \nCVE-2023-3428)\n\nIt was discovered that ImageMagick incorrectly handled certain values \nwhen processing specially crafted SVG files. By tricking a user into \nopening a specially crafted SVG file, an attacker could crash the \napplication causing a denial of service. This issue only affected Ubuntu \n20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain \ncircumstances. If a user were tricked into opening a specially crafted \ntiff file, an attacker could possibly exploit this issue to cause a denial \nof service or other unspecified impact. This issue only affected Ubuntu \n22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)\n\nIt was discovered that ImageMagick incorrectly handled memory under certain \ncircumstances. If a user were tricked into opening a specially crafted \nimage file, an attacker could possibly exploit this issue to cause a denial \nof service or other unspecified impact. (CVE-2023-34151)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-07-04T00:00:00", "type": "ubuntu", "title": "ImageMagick vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-29599", "CVE-2021-20224", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-3610", "CVE-2021-39212", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547", "CVE-2023-1289", "CVE-2023-1906", "CVE-2023-3195", "CVE-2023-34151", "CVE-2023-3428"], "modified": "2023-07-04T00:00:00", "id": "USN-6200-1", "href": "https://ubuntu.com/security/notices/USN-6200-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cloudfoundry": [{"lastseen": "2023-06-17T15:10:51", "description": "# \n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n\u2022 Canonical Ubuntu 18.04\n\n# Description\n\nIt was discovered that ImageMagick incorrectly handled certain values when processing PDF files. If a user or automated system using ImageMagick were tricked into opening a specially crafted PDF file, an attacker could exploit this to cause a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224) Zhang Xiaohui discovered that ImageMagick incorrectly handled certain values when processing image data. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241) Zhang Xiaohui discovered that ImageMagick incorrectly handled certain values when processing image data. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20243) It was discovered that ImageMagick incorrectly handled certain values when processing visual effects based image files. By tricking a user into opening a specially crafted image file, an attacker could crash the application causing a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20244) It was discovered that ImageMagick could be made to divide by zero when processing crafted files. By tricking a user into opening a specially crafted image file, an attacker could crash the application causing a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245) It was discovered that ImageMagick incorrectly handled certain values when performing resampling operations. By tricking a user into opening a specially crafted image file, an attacker could crash the application causing a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20246) It was discovered that ImageMagick incorrectly handled certain values when processing visual effects based image files. By tricking a user into opening a specially crafted image file, an attacker could crash the application causing a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20309) It was discovered that ImageMagick incorrectly handled certain values when processing thumbnail image data. By tricking a user into opening a specially crafted image file, an attacker could crash the application causing a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20312) It was discovered that ImageMagick incorrectly handled memory cleanup when performing certain cryptographic operations. Under certain conditions sensitive cryptographic information could be disclosed. This issue only affected Ubuntu 22.10. (CVE-2021-20313) It was discovered that ImageMagick did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted file using the convert command, an attacker could possibly use this issue to cause ImageMagick to crash, resulting in a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-3574) It was discovered that ImageMagick did not use the correct rights when specifically excluded by a module policy. An attacker could use this issue to read and write certain restricted files. This issue only affected Ubuntu 22.10. (CVE-2021-39212) It was discovered that ImageMagick incorrectly handled certain values when processing specially crafted SVG files. By tricking a user into opening a specially crafted SVG file, an attacker could crash the application causing a denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-4219) It was discovered that ImageMagick did not properly manage memory under certain circumstances. If a user were tricked into opening a specially crafted DICOM file, an attacker could possibly use this issue to cause ImageMagick to crash, resulting in a denial of servicei, or expose sensitive information. This issue only affected Ubuntu 22.10. (CVE-2022-1114) It was discovered that ImageMagick incorrectly handled memory under certain circumstances. If a user were tricked into opening a specially crafted image file, an attacker could possibly exploit this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 22.10. (CVE-2022-28463) It was discovered that ImageMagick incorrectly handled certain values. If a user were tricked into processing a specially crafted image file, an attacker could possibly exploit this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546) It was discovered that ImageMagick incorrectly handled memory under certain circumstances. If a user were tricked into processing a specially crafted image file, an attacker could possibly exploit this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547) Update Instructions: Run `sudo pro fix USN-5736-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: imagemagick-common \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickcore-6.q16-dev \u2013 8:6.8.9.9-7ubuntu5.16+esm5 imagemagick \u2013 8:6.8.9.9-7ubuntu5.16+esm5 imagemagick-doc \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickwand-6.q16-dev \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagick++-6-headers \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libimage-magick-q16-perl \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickwand-dev \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libimage-magick-perl \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagick++-dev \u2013 8:6.8.9.9-7ubuntu5.16+esm5 imagemagick-6.q16 \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagick++-6.q16-5v5 \u2013 8:6.8.9.9-7ubuntu5.16+esm5 perlmagick \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickwand-6.q16-2 \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickcore-6-headers \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickcore-6-arch-config \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagick++-6.q16-dev \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickcore-6.q16-2-extra \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickcore-dev \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickwand-6-headers \u2013 8:6.8.9.9-7ubuntu5.16+esm5 libmagickcore-6.q16-2 \u2013 8:6.8.9.9-7ubuntu5.16+esm5 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro \nCVEs contained in this USN include: CVE-2021-20244, CVE-2021-20246, CVE-2021-20309, CVE-2021-20312, CVE-2021-20313, CVE-2021-20241, CVE-2021-20243, CVE-2022-28463, CVE-2021-20224, CVE-2021-20245, CVE-2021-3574, CVE-2021-39212, CVE-2021-4219, CVE-2022-1114, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547.\n\n## Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * cflinuxfs3 \n * All versions prior to 0.339.0\n * CF Deployment \n * All versions prior to 24.0.0\n\n## Mitigation\n\nUsers of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:\n\n * cflinuxfs3 \n * Upgrade all versions to 0.339.0 or greater\n * CF Deployment \n * Upgrade all versions to 24.0.0 or greater\n\n## References\n\n * [USN Notice](<https://ubuntu.com/security/notices/USN-5736-1>)\n * [CVE-2021-20244](<https://ubuntu.com/security/CVE-2021-20244>)\n * [CVE-2021-20246](<https://ubuntu.com/security/CVE-2021-20246>)\n * [CVE-2021-20309](<https://ubuntu.com/security/CVE-2021-20309>)\n * [CVE-2021-20312](<https://ubuntu.com/security/CVE-2021-20312>)\n * [CVE-2021-20313](<https://ubuntu.com/security/CVE-2021-20313>)\n * [CVE-2021-20241](<https://ubuntu.com/security/CVE-2021-20241>)\n * [CVE-2021-20243](<https://ubuntu.com/security/CVE-2021-20243>)\n * [CVE-2022-28463](<https://ubuntu.com/security/CVE-2022-28463>)\n * [CVE-2021-20224](<https://ubuntu.com/security/CVE-2021-20224>)\n * [CVE-2021-20245](<https://ubuntu.com/security/CVE-2021-20245>)\n * [CVE-2021-3574](<https://ubuntu.com/security/CVE-2021-3574>)\n * [CVE-2021-39212](<https://ubuntu.com/security/CVE-2021-39212>)\n * [CVE-2021-4219](<https://ubuntu.com/security/CVE-2021-4219>)\n * [CVE-2022-1114](<https://ubuntu.com/security/CVE-2022-1114>)\n * [CVE-2022-32545](<https://ubuntu.com/security/CVE-2022-32545>)\n * [CVE-2022-32546](<https://ubuntu.com/security/CVE-2022-32546>)\n * [CVE-2022-32547](<https://ubuntu.com/security/CVE-2022-32547>)\n\n# History\n\n2023-02-03: Initial vulnerability report published.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2023-02-03T00:00:00", "type": "cloudfoundry", "title": "USN-5736-1: ImageMagick vulnerabilities | Cloud Foundry", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-20224", "CVE-2021-20241", "CVE-2021-20243", "CVE-2021-20244", "CVE-2021-20245", "CVE-2021-20246", "CVE-2021-20309", "CVE-2021-20312", "CVE-2021-20313", "CVE-2021-3574", "CVE-2021-39212", "CVE-2021-4219", "CVE-2022-1114", "CVE-2022-28463", "CVE-2022-32545", "CVE-2022-32546", "CVE-2022-32547"], "modified": "2023-02-03T00:00:00", "id": "CFOUNDRY:79DABBA759F410C474AC5B5A7DA62830", "href": "https://www.cloudfoundry.org/blog/usn-5736-1-imagemagick-vulnerabilities/", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "debian": [{"lastseen": "2023-03-19T17:48:26", "description": "-------------------------------------------------------------------------\nDebian LTS Advisory DLA-2602-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ Markus Koschany\nMarch 23, 2021 https://wiki.debian.org/LTS\n-------------------------------------------------------------------------\n\nPackage : imagemagick\nVersion : 8:6.9.7.4+dfsg-11+deb9u12\nCVE ID : CVE-2020-25666 CVE-2020-25675 CVE-2020-25676 CVE-2020-27754 \n CVE-2020-27757 CVE-2020-27758 CVE-2020-27759 CVE-2020-27761 \n CVE-2020-27762 CVE-2020-27764 CVE-2020-27766 CVE-2020-27767 \n CVE-2020-27768 CVE-2020-27769 CVE-2020-27770 CVE-2020-27771 \n CVE-2020-27772 CVE-2020-27774 CVE-2020-27775 CVE-2021-20176 \n CVE-2021-20241 CVE-2021-20244 CVE-2021-20246\n\nMultiple security vulnerabilities were found in Imagemagick. Missing or\nincomplete input sanitizing may lead to undefined behavior which can result\nin denial of service (application crash) or other unspecified impact.\n\nFor Debian 9 stretch, these problems have been fixed in version\n8:6.9.7.4+dfsg-11+deb9u12.\n\nWe recommend that you upgrade your imagemagick packages.\n\nFor the detailed security status of imagemagick please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/imagemagick\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\nAttachment:\nsignature.asc\nDescription: This is a digitally signed message part\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-03-23T22:55:18", "type": "debian", "title": "[SECURITY] [DLA 2602-1] imagemagick security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-25666", "CVE-2020-25675", "CVE-2020-25676", "CVE-2020-27754", "CVE-2020-27757", "CVE-2020-27758", "CVE-2020-27759", "CVE-2020-27761", "CVE-2020-27762", "CVE-2020-27764", "CVE-2020-27766", "CVE-2020-27767", "CVE-2020-27768", "CVE-2020-27769", "CVE-2020-27770", "CVE-2020-27771", "CVE-2020-27772", "CVE-2020-27774", "CVE-2020-27775", "CVE-2021-20176", "CVE-2021-20241", "CVE-2021-20244", "CVE-2021-20246"], "modified": "2021-03-23T22:55:18", "id": "DEBIAN:DLA-2602-1:29BED", "href": "https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}]}