Lucene search

K
nessusThis script is Copyright (C) 2014-2023 Tenable Network Security, Inc.IMAGEMAGICK_6_8_7_6.NASL
HistoryFeb 27, 2014 - 12:00 a.m.

ImageMagick < 6.8.7-6 WritePSDImage PSD Handling Memory Corruption

2014-02-2700:00:00
This script is Copyright (C) 2014-2023 Tenable Network Security, Inc.
www.tenable.com
21

The remote Windows host is running a version of ImageMagick prior to version 6.8.7-6. It is, therefore, affected by a memory corruption vulnerability related to PSD image file handling and the β€˜WritePSDImage’ function. Exploitation of this issue could result in a denial of service or arbitrary code execution.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(72721);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/07");

  script_cve_id("CVE-2014-1947");
  script_bugtraq_id(65683);

  script_name(english:"ImageMagick < 6.8.7-6 WritePSDImage PSD Handling Memory Corruption");
  script_summary(english:"Checks the version of ImageMagick");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by a
memory corruption vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host is running a version of ImageMagick prior to
version 6.8.7-6.  It is, therefore, affected by a memory corruption
vulnerability related to PSD image file handling and the 'WritePSDImage'
function.  Exploitation of this issue could result in a denial of
service or arbitrary code execution.");
  script_set_attribute(attribute:"see_also", value:"http://www.imagemagick.org/script/changelog.php");
  script_set_attribute(attribute:"solution", value:
"Upgrade to ImageMagick 6.8.7-6 or later.

Note that you may need to manually uninstall the vulnerable version
from the system.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-1947");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/11/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/11/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/27");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:imagemagick:imagemagick");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2023 Tenable Network Security, Inc.");

  script_dependencies("imagemagick_installed.nasl");
  script_require_keys("installed_sw/ImageMagick");

  exit(0);
}

include('vcf.inc');
include('vcf_extras.inc');

vcf::imagemagick::initialize();
var app_info = vcf::imagemagick::get_app_info();

var constraints = [
  {'fixed_version' : '6.8.7-6'}
];

vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_WARNING
);
VendorProductVersionCPE
imagemagickimagemagickcpe:/a:imagemagick:imagemagick