This update fixes several vulnerabilities in Graphicsmagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or the execution of arbitrary code if malformed media files are processed.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-4640. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('compat.inc');
if (description)
{
script_id(134577);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/22");
script_cve_id(
"CVE-2018-20184",
"CVE-2018-20185",
"CVE-2018-20189",
"CVE-2019-11005",
"CVE-2019-11006",
"CVE-2019-11007",
"CVE-2019-11008",
"CVE-2019-11009",
"CVE-2019-11010",
"CVE-2019-11473",
"CVE-2019-11474",
"CVE-2019-11505",
"CVE-2019-11506",
"CVE-2019-19950",
"CVE-2019-19951",
"CVE-2019-19953"
);
script_xref(name:"DSA", value:"4640");
script_name(english:"Debian DSA-4640-1 : graphicsmagick - security update");
script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing a security-related update.");
script_set_attribute(attribute:"description", value:
"This update fixes several vulnerabilities in Graphicsmagick: Various
memory handling problems and cases of missing or incomplete input
sanitising may result in denial of service, memory disclosure or the
execution of arbitrary code if malformed media files are processed.");
# https://security-tracker.debian.org/tracker/source-package/graphicsmagick
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e247f871");
script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/stretch/graphicsmagick");
script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2020/dsa-4640");
script_set_attribute(attribute:"solution", value:
"Upgrade the graphicsmagick packages.
For the oldstable distribution (stretch), these problems have been
fixed in version 1.3.30+hg15796-1~deb9u3.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-19951");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/12/17");
script_set_attribute(attribute:"patch_publication_date", value:"2020/03/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:graphicsmagick");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Debian Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"9.0", prefix:"graphicsmagick", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"graphicsmagick-dbg", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"graphicsmagick-imagemagick-compat", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"graphicsmagick-libmagick-dev-compat", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"libgraphics-magick-perl", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"libgraphicsmagick++-q16-12", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"libgraphicsmagick++1-dev", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"libgraphicsmagick-q16-3", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (deb_check(release:"9.0", prefix:"libgraphicsmagick1-dev", reference:"1.3.30+hg15796-1~deb9u3")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | graphicsmagick | p-cpe:/a:debian:debian_linux:graphicsmagick |
debian | debian_linux | 9.0 | cpe:/o:debian:debian_linux:9.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20184
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20185
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20189
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953
www.nessus.org/u?e247f871
packages.debian.org/source/stretch/graphicsmagick
www.debian.org/security/2020/dsa-4640