It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-3681-1. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include('compat.inc');
if (description)
{
script_id(110516);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/21");
script_cve_id(
"CVE-2017-1000445",
"CVE-2017-1000476",
"CVE-2017-10995",
"CVE-2017-11352",
"CVE-2017-11533",
"CVE-2017-11535",
"CVE-2017-11537",
"CVE-2017-11639",
"CVE-2017-11640",
"CVE-2017-12140",
"CVE-2017-12418",
"CVE-2017-12429",
"CVE-2017-12430",
"CVE-2017-12431",
"CVE-2017-12432",
"CVE-2017-12433",
"CVE-2017-12435",
"CVE-2017-12563",
"CVE-2017-12587",
"CVE-2017-12640",
"CVE-2017-12643",
"CVE-2017-12644",
"CVE-2017-12670",
"CVE-2017-12674",
"CVE-2017-12691",
"CVE-2017-12692",
"CVE-2017-12693",
"CVE-2017-12875",
"CVE-2017-12877",
"CVE-2017-12983",
"CVE-2017-13058",
"CVE-2017-13059",
"CVE-2017-13060",
"CVE-2017-13061",
"CVE-2017-13062",
"CVE-2017-13131",
"CVE-2017-13134",
"CVE-2017-13139",
"CVE-2017-13142",
"CVE-2017-13143",
"CVE-2017-13144",
"CVE-2017-13145",
"CVE-2017-13758",
"CVE-2017-13768",
"CVE-2017-13769",
"CVE-2017-14060",
"CVE-2017-14172",
"CVE-2017-14173",
"CVE-2017-14174",
"CVE-2017-14175",
"CVE-2017-14224",
"CVE-2017-14249",
"CVE-2017-14325",
"CVE-2017-14326",
"CVE-2017-14341",
"CVE-2017-14342",
"CVE-2017-14343",
"CVE-2017-14400",
"CVE-2017-14505",
"CVE-2017-14531",
"CVE-2017-14532",
"CVE-2017-14533",
"CVE-2017-14607",
"CVE-2017-14624",
"CVE-2017-14625",
"CVE-2017-14626",
"CVE-2017-14682",
"CVE-2017-14684",
"CVE-2017-14739",
"CVE-2017-14741",
"CVE-2017-14989",
"CVE-2017-15015",
"CVE-2017-15016",
"CVE-2017-15017",
"CVE-2017-15032",
"CVE-2017-15033",
"CVE-2017-15217",
"CVE-2017-15218",
"CVE-2017-15277",
"CVE-2017-15281",
"CVE-2017-16546",
"CVE-2017-17499",
"CVE-2017-17504",
"CVE-2017-17680",
"CVE-2017-17681",
"CVE-2017-17682",
"CVE-2017-17879",
"CVE-2017-17881",
"CVE-2017-17882",
"CVE-2017-17884",
"CVE-2017-17885",
"CVE-2017-17886",
"CVE-2017-17887",
"CVE-2017-17914",
"CVE-2017-17934",
"CVE-2017-18008",
"CVE-2017-18022",
"CVE-2017-18027",
"CVE-2017-18028",
"CVE-2017-18029",
"CVE-2017-18209",
"CVE-2017-18211",
"CVE-2017-18251",
"CVE-2017-18252",
"CVE-2017-18254",
"CVE-2017-18271",
"CVE-2017-18273",
"CVE-2018-10177",
"CVE-2018-10804",
"CVE-2018-10805",
"CVE-2018-11251",
"CVE-2018-11625",
"CVE-2018-11655",
"CVE-2018-11656",
"CVE-2018-5246",
"CVE-2018-5247",
"CVE-2018-5248",
"CVE-2018-5357",
"CVE-2018-5358",
"CVE-2018-6405",
"CVE-2018-7443",
"CVE-2018-8804",
"CVE-2018-8960",
"CVE-2018-9133"
);
script_xref(name:"USN", value:"3681-1");
script_name(english:"Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : ImageMagick vulnerabilities (USN-3681-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote Ubuntu host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"It was discovered that ImageMagick incorrectly handled certain
malformed image files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted image, an attacker could
exploit this to cause a denial of service or possibly execute code
with the privileges of the user invoking the program.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://ubuntu.com/security/notices/USN-3681-1");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-18211");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/07/07");
script_set_attribute(attribute:"patch_publication_date", value:"2018/06/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/06/13");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:imagemagick");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16hdri");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:imagemagick-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16hdri-perl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6-headers");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-5v5");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-7");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-7");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-6.q16hdri-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagick++5");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-arch-config");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6-headers");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-2-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-3-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-3-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-6.q16hdri-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore5");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickcore5-extra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6-headers");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-6.q16hdri-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libmagickwand5");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:perlmagick");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Ubuntu Local Security Checks");
script_copyright(english:"Ubuntu Security Notice (C) 2018-2023 Canonical, Inc. / NASL script (C) 2018-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include('debian_package.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/Ubuntu/release');
if ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');
os_release = chomp(os_release);
if (! ('14.04' >< os_release || '16.04' >< os_release || '18.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04 / 16.04 / 18.04', 'Ubuntu ' + os_release);
if ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);
var pkgs = [
{'osver': '14.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagick++5', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagickcore5', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagickcore5-extra', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'libmagickwand5', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '14.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.7.7.10-6ubuntu3.11'},
{'osver': '16.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagick++-6.q16-5v5', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-2-extra', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-2', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '16.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.8.9.9-7ubuntu5.11'},
{'osver': '18.04', 'pkgname': 'imagemagick', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'imagemagick-6-common', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'imagemagick-6.q16', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'imagemagick-6.q16hdri', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'imagemagick-common', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libimage-magick-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libimage-magick-q16-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libimage-magick-q16hdri-perl', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagick++-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagick++-6.q16-7', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagick++-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagick++-6.q16hdri-7', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagick++-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagick++-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6-arch-config', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-3-extra', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-3-extra', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickcore-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickwand-6-headers', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickwand-6.q16-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickwand-6.q16-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickwand-6.q16hdri-3', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickwand-6.q16hdri-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'libmagickwand-dev', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'},
{'osver': '18.04', 'pkgname': 'perlmagick', 'pkgver': '8:6.9.7.4+dfsg-16ubuntu6.2'}
];
var flag = 0;
foreach package_array ( pkgs ) {
var osver = NULL;
var pkgname = NULL;
var pkgver = NULL;
if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];
if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];
if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];
if (osver && pkgname && pkgver) {
if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
var tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'imagemagick / imagemagick-6-common / imagemagick-6.q16 / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | ubuntu_linux | imagemagick | p-cpe:/a:canonical:ubuntu_linux:imagemagick |
canonical | ubuntu_linux | imagemagick-6-common | p-cpe:/a:canonical:ubuntu_linux:imagemagick-6-common |
canonical | ubuntu_linux | imagemagick-6.q16 | p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16 |
canonical | ubuntu_linux | imagemagick-6.q16hdri | p-cpe:/a:canonical:ubuntu_linux:imagemagick-6.q16hdri |
canonical | ubuntu_linux | imagemagick-common | p-cpe:/a:canonical:ubuntu_linux:imagemagick-common |
canonical | ubuntu_linux | libimage-magick-perl | p-cpe:/a:canonical:ubuntu_linux:libimage-magick-perl |
canonical | ubuntu_linux | libimage-magick-q16-perl | p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16-perl |
canonical | ubuntu_linux | libimage-magick-q16hdri-perl | p-cpe:/a:canonical:ubuntu_linux:libimage-magick-q16hdri-perl |
canonical | ubuntu_linux | libmagick%2b%2b-6-headers | p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6-headers |
canonical | ubuntu_linux | libmagick%2b%2b-6.q16-5v5 | p-cpe:/a:canonical:ubuntu_linux:libmagick%2b%2b-6.q16-5v5 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12430
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12674
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14341
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14626
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18211
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18273
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133
ubuntu.com/security/notices/USN-3681-1