Lucene search

K
debianDebianDEBIAN:DSA-4712-1:143FB
HistoryJun 30, 2020 - 8:31 p.m.

[SECURITY] [DSA 4712-1] imagemagick security update

2020-06-3020:31:53
lists.debian.org
57

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

Low

EPSS

0.049

Percentile

93.0%


Debian Security Advisory DSA-4712-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
June 30, 2020 https://www.debian.org/security/faq


Package : imagemagick
CVE ID : CVE-2019-7175 CVE-2019-7395 CVE-2019-7396 CVE-2019-7397
CVE-2019-7398 CVE-2019-10649 CVE-2019-11470 CVE-2019-11472
CVE-2019-11597 CVE-2019-11598 CVE-2019-12974 CVE-2019-12975
CVE-2019-12976 CVE-2019-12977 CVE-2019-12978 CVE-2019-12979
CVE-2019-13135 CVE-2019-13137 CVE-2019-13295 CVE-2019-13297
CVE-2019-13300 CVE-2019-13301 CVE-2019-13304 CVE-2019-13305
CVE-2019-13307 CVE-2019-13308 CVE-2019-13309 CVE-2019-13311
CVE-2019-13454 CVE-2019-14981 CVE-2019-15139 CVE-2019-15140
CVE-2019-16708 CVE-2019-16710 CVE-2019-16711 CVE-2019-16713
CVE-2019-19948 CVE-2019-19949

This update fixes multiple vulnerabilities in Imagemagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure or potentially the
execution of arbitrary code if malformed image files are processed.

For the stable distribution (buster), these problems have been fixed in
version 8:6.9.10.23+dfsg-2.1+deb10u1.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

Low

EPSS

0.049

Percentile

93.0%