Lucene search

K
debian
DebianDEBIAN:DLA-960-1:AD3CB
HistoryMay 29, 2017 - 2:18 a.m.

[SECURITY] [DLA 960-1] imagemagick security update

2017-05-2902:18:26
lists.debian.org
9

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

85.8%

Package : imagemagick
Version : 6.7.7.10-5+deb7u14
CVE ID : CVE-2014-8354 CVE-2014-8355 CVE-2014-8562 CVE-2014-8716
CVE-2014-9841 CVE-2015-8900 CVE-2015-8901 CVE-2015-8902
CVE-2015-8903 CVE-2017-7941 CVE-2017-7943 CVE-2017-8343
CVE-2017-8344 CVE-2017-8345 CVE-2017-8346 CVE-2017-8347
CVE-2017-8348 CVE-2017-8349 CVE-2017-8350 CVE-2017-8351
CVE-2017-8352 CVE-2017-8353 CVE-2017-8354 CVE-2017-8355
CVE-2017-8356 CVE-2017-8357 CVE-2017-8765 CVE-2017-8830
CVE-2017-9098 CVE-2017-9141 CVE-2017-9142 CVE-2017-9143
CVE-2017-9144
Debian Bug : 767240 767240 768494 773834 860734 860736 862572 862574
862573 862575 862577 862578 862579 862587 862589 862590
862632 862633 862634 862635 862636 862653 862637 862967
863124 863125 863123 863126

This update fixes several vulnerabilities in imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure, or the execution of
arbitrary code if malformed PCX, DCM, JPEG, PSD, HDR, MIFF, PDB, VICAR,
SGI, SVG, AAI, MNG, EXR, MAT, SFW, JNG, PCD, XWD, PICT, BMP, MTV, SUN,
EPT, ICON, DDS, or ART files are processed.

For Debian 7 "Wheezy", these problems have been fixed in version
6.7.7.10-5+deb7u14.

We recommend that you upgrade your imagemagick packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment:
signature.asc
Description: Digital signature

Use Vulners API to create your own security tool

API usage cases
  • Network scanning
  • Linux Patch management
  • Threat protection
  • No network audit solution

Ways of integration

Integrate Vulners API

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

85.8%

Related for DEBIAN:DLA-960-1:AD3CB