Lucene search

K
debianDebianDEBIAN:DLA-1619-1:22D20
HistoryDec 27, 2018 - 1:41 p.m.

[SECURITY] [DLA 1619-1] graphicsmagick security update

2018-12-2713:41:48
lists.debian.org
59

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

58.1%

Package : graphicsmagick
Version : 1.3.20-3+deb8u5
CVE ID : CVE-2018-20184 CVE-2018-20185 CVE-2018-20189
Debian Bug : 916752 916719 916721

Multiple vulnerabilities have been found in GraphicsMagick, the image
processing system.

CVE-2018-20184

The WriteTGAImage function (tga.c) is affected by a heap-based buffer
overflow. Remote attackers might leverage this vulnerability to cause
a denial of service via a crafted image file.

CVE-2018-20185

The ReadBMPImage function (bmp.c) is affected by a heap-based buffer
over-read. Remote attackers might leverage this vulnerability to cause
a denial of service via a crafted image file.

CVE-2018-20189

The ReadDIBImage function (coders/dib.c) is affected by an assertion
error. Remote attackers might leverage this vulnerability to cause
a denial of service via a crafted image file.

For Debian 8 "Jessie", these problems have been fixed in version
1.3.20-3+deb8u5.

We recommend that you upgrade your graphicsmagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

58.1%