Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-18220 (GCVE-0-2017-18220)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:49.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "name": "[debian-lts-announce] 20180328 [SECURITY] [DLA 1322-1] graphicsmagick security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "name": "DSA-4321", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4321" }, { "name": "103276", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103276" }, { "name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "name": "FEDORA-2019-da4c20882c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "name": "FEDORA-2019-425a1aa7c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-30T03:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "name": "[debian-lts-announce] 20180328 [SECURITY] [DLA 1322-1] graphicsmagick security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "name": "DSA-4321", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4321" }, { "name": "103276", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103276" }, { "name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "name": "FEDORA-2019-da4c20882c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "name": "FEDORA-2019-425a1aa7c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/graphicsmagick/bugs/438/", "refsource": "CONFIRM", "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "name": "[debian-lts-announce] 20180328 [SECURITY] [DLA 1322-1] graphicsmagick security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f", "refsource": "CONFIRM", "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "name": "DSA-4321", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4321" }, { "name": "103276", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103276" }, { "name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "name": "FEDORA-2019-da4c20882c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "name": "FEDORA-2019-425a1aa7c9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18220", "datePublished": "2018-03-05T22:00:00", "dateReserved": "2018-03-05T00:00:00", "dateUpdated": "2024-08-05T21:13:49.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-18220\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-03-05T22:29:00.277\",\"lastModified\":\"2024-11-21T03:19:36.143\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.\"},{\"lang\":\"es\",\"value\":\"Las funciones ReadOneJNGImage y ReadJNGImage en coders/png.c en GraphicsMagick 1.3.26 permiten que atacantes remotos provoquen una denegaci\u00f3n de servicio (DoS) (uso de memoria previamente liberada en CloseBlob en magick/blob.c) u otro tipo de impacto sin especificar mediante un archivo manipulado. Este problema est\u00e1 relacionado con CVE-2017-11403.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C227898-C6EC-41BE-A3AD-229FFD8B86D8\"}]}]}],\"references\":[{\"url\":\"http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/103276\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sourceforge.net/p/graphicsmagick/bugs/438/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4321\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/103276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://sourceforge.net/p/graphicsmagick/bugs/438/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-pm5j-x49r-ccq7
Vulnerability from github
The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.
{ "affected": [], "aliases": [ "CVE-2017-18220" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-03-05T22:29:00Z", "severity": "HIGH" }, "details": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.", "id": "GHSA-pm5j-x49r-ccq7", "modified": "2022-05-14T02:20:32Z", "published": "2022-05-14T02:20:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18220" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ" }, { "type": "WEB", "url": "https://sourceforge.net/p/graphicsmagick/bugs/438" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4321" }, { "type": "WEB", "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103276" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cnvd-2018-04994
Vulnerability from cnvd
Title: GraphicsMagick拒绝服务漏洞(CNVD-2018-04994)
Description:
GraphicsMagick是一套简单的图像处理工具。该工具对图像提供尺寸调整、旋转、加亮等功能。
GraphicsMagick 1.3.26版本中的coders/png.c文件的‘ReadOneJNGImage’函数和‘ReadJNGImage’函数存在安全漏洞。远程攻击者可借助特制的文件利用该漏洞造成拒绝服务(magick/blob.c文件的‘CloseBlob’函数释放后重用)。
Severity: 中
Patch Name: GraphicsMagick拒绝服务漏洞(CNVD-2018-04994)的补丁
Patch Description:
GraphicsMagick是一套简单的图像处理工具。该工具对图像提供尺寸调整、旋转、加亮等功能。
GraphicsMagick 1.3.26版本中的coders/png.c文件的‘ReadOneJNGImage’函数和‘ReadJNGImage’函数存在安全漏洞。远程攻击者可借助特制的文件利用该漏洞造成拒绝服务(magick/blob.c文件的‘CloseBlob’函数释放后重用)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布漏洞修复程序,请及时关注更新: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f
Reference: https://nvd.nist.gov/vuln/detail/CVE-2017-18220
Name | GraphicsMagick GraphicsMagick 1.3.26 |
---|
{ "bids": { "bid": { "bidNumber": "103276" } }, "cves": { "cve": { "cveNumber": "CVE-2017-18220" } }, "description": "GraphicsMagick\u662f\u4e00\u5957\u7b80\u5355\u7684\u56fe\u50cf\u5904\u7406\u5de5\u5177\u3002\u8be5\u5de5\u5177\u5bf9\u56fe\u50cf\u63d0\u4f9b\u5c3a\u5bf8\u8c03\u6574\u3001\u65cb\u8f6c\u3001\u52a0\u4eae\u7b49\u529f\u80fd\u3002\r\n\r\nGraphicsMagick 1.3.26\u7248\u672c\u4e2d\u7684coders/png.c\u6587\u4ef6\u7684\u2018ReadOneJNGImage\u2019\u51fd\u6570\u548c\u2018ReadJNGImage\u2019\u51fd\u6570\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08magick/blob.c\u6587\u4ef6\u7684\u2018CloseBlob\u2019\u51fd\u6570\u91ca\u653e\u540e\u91cd\u7528\uff09\u3002", "discovererName": "ADLab of Venustech", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttp://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-04994", "openTime": "2018-03-13", "patchDescription": "GraphicsMagick\u662f\u4e00\u5957\u7b80\u5355\u7684\u56fe\u50cf\u5904\u7406\u5de5\u5177\u3002\u8be5\u5de5\u5177\u5bf9\u56fe\u50cf\u63d0\u4f9b\u5c3a\u5bf8\u8c03\u6574\u3001\u65cb\u8f6c\u3001\u52a0\u4eae\u7b49\u529f\u80fd\u3002\r\n\r\nGraphicsMagick 1.3.26\u7248\u672c\u4e2d\u7684coders/png.c\u6587\u4ef6\u7684\u2018ReadOneJNGImage\u2019\u51fd\u6570\u548c\u2018ReadJNGImage\u2019\u51fd\u6570\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08magick/blob.c\u6587\u4ef6\u7684\u2018CloseBlob\u2019\u51fd\u6570\u91ca\u653e\u540e\u91cd\u7528\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "GraphicsMagick\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2018-04994\uff09\u7684\u8865\u4e01", "products": { "product": "GraphicsMagick GraphicsMagick 1.3.26" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-18220", "serverity": "\u4e2d", "submitTime": "2018-03-06", "title": "GraphicsMagick\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2018-04994\uff09" }
gsd-2017-18220
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-18220", "description": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.", "id": "GSD-2017-18220", "references": [ "https://www.suse.com/security/cve/CVE-2017-18220.html", "https://www.debian.org/security/2018/dsa-4321" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-18220" ], "details": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.", "id": "GSD-2017-18220", "modified": "2023-12-13T01:21:11.395335Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/graphicsmagick/bugs/438/", "refsource": "CONFIRM", "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "name": "[debian-lts-announce] 20180328 [SECURITY] [DLA 1322-1] graphicsmagick security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f", "refsource": "CONFIRM", "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "name": "DSA-4321", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4321" }, { "name": "103276", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103276" }, { "name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "name": "FEDORA-2019-da4c20882c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "name": "FEDORA-2019-425a1aa7c9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18220" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://sourceforge.net/p/graphicsmagick/bugs/438/", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "name": "103276", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103276" }, { "name": "[debian-lts-announce] 20180328 [SECURITY] [DLA 1322-1] graphicsmagick security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "name": "DSA-4321", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2018/dsa-4321" }, { "name": "FEDORA-2019-da4c20882c", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "name": "FEDORA-2019-425a1aa7c9", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2018-10-18T10:29Z", "publishedDate": "2018-03-05T22:29Z" } } }
suse-su-2018:0864-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for GraphicsMagick", "title": "Title of the patch" }, { "category": "description", "text": "This update for GraphicsMagick fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a\n denial of service (assertion failure and application exit) via a crafted file\n (bsc#1050087)\n- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage\n function caused by a heap-based buffer over-read. The portion of the code\n containing the vulnerability is responsible for printing the IPTC Profile\n information contained in the image. This vulnerability can be triggered with a\n specially crafted MIFF file. There is an out-of-bounds buffer dereference\n because certain increments were never checked (bsc#1066170)\n- CVE-2017-16352: Prevent a heap-based buffer overflow in the \u0027Display visual\n image directory\u0027 feature of the DescribeImage() function. One possible way to\n trigger the vulnerability is to run the identify command on a specially crafted\n MIFF format file with the verbose flag (bsc#1066168)\n- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that\n allowed remote attackers to cause a denial of service (DrawDashPolygon\n heap-based buffer over-read and application crash) via a crafted file\n (bsc#1058630)\n- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to\n perform Denial of Service (NULL pointer dereference and application crash in\n AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image\n File as input (bsc#1059735)\n- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in\n ReadEnhMetaFile allowing for denial of service (bsc#1082291)\n- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in\n ReadOneMNGImage allowing for denial of service (bsc#1082283)\n- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a\n denial of service (memory consumption) via a crafted BMP file (bsc#1082348)\n- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,\n which allowed attackers to cause a denial of service via a crafted file that\n triggers an attempt at a large png_pixels array allocation (bsc#1084060)\n- CVE-2017-18230: Prevent NULL pointer dereference in the function\n ReadCINEONImage, which allowed attackers to cause a denial of service via a\n crafted file (bsc#1085233).\n- CVE-2017-18220: The ReadOneJNGImage and ReadJNGImage functions allowed remote\n attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free)\n or possibly have unspecified other impact via a crafted file (bsc#1084062).\n ", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-GraphicsMagick-13543,slestso13-GraphicsMagick-13543", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0864-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0864-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180864-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0864-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" }, { "category": "self", "summary": "SUSE Bug 1050087", "url": "https://bugzilla.suse.com/1050087" }, { "category": "self", "summary": "SUSE Bug 1058630", "url": "https://bugzilla.suse.com/1058630" }, { "category": "self", "summary": "SUSE Bug 1059735", "url": "https://bugzilla.suse.com/1059735" }, { "category": "self", "summary": "SUSE Bug 1066168", "url": "https://bugzilla.suse.com/1066168" }, { "category": "self", "summary": "SUSE Bug 1066170", "url": "https://bugzilla.suse.com/1066170" }, { "category": "self", "summary": "SUSE Bug 1082283", "url": "https://bugzilla.suse.com/1082283" }, { "category": "self", "summary": "SUSE Bug 1082291", "url": "https://bugzilla.suse.com/1082291" }, { "category": "self", "summary": "SUSE Bug 1082348", "url": "https://bugzilla.suse.com/1082348" }, { "category": "self", "summary": "SUSE Bug 1084060", "url": "https://bugzilla.suse.com/1084060" }, { "category": "self", "summary": "SUSE Bug 1084062", "url": "https://bugzilla.suse.com/1084062" }, { "category": "self", "summary": "SUSE Bug 1085233", "url": "https://bugzilla.suse.com/1085233" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11524 page", "url": "https://www.suse.com/security/cve/CVE-2017-11524/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12691 page", "url": "https://www.suse.com/security/cve/CVE-2017-12691/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12693 page", "url": "https://www.suse.com/security/cve/CVE-2017-12693/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14314 page", "url": "https://www.suse.com/security/cve/CVE-2017-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14343 page", "url": "https://www.suse.com/security/cve/CVE-2017-14343/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14505 page", "url": "https://www.suse.com/security/cve/CVE-2017-14505/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15016 page", "url": "https://www.suse.com/security/cve/CVE-2017-15016/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15017 page", "url": "https://www.suse.com/security/cve/CVE-2017-15017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16352 page", "url": "https://www.suse.com/security/cve/CVE-2017-16352/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16353 page", "url": "https://www.suse.com/security/cve/CVE-2017-16353/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18219 page", "url": "https://www.suse.com/security/cve/CVE-2017-18219/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18220 page", "url": "https://www.suse.com/security/cve/CVE-2017-18220/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18230 page", "url": "https://www.suse.com/security/cve/CVE-2017-18230/" } ], "title": "Security update for GraphicsMagick", "tracking": { "current_release_date": "2018-04-03T15:17:14Z", "generator": { "date": "2018-04-03T15:17:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0864-1", "initial_release_date": "2018-04-03T15:17:14Z", "revision_history": [ { "date": "2018-04-03T15:17:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "GraphicsMagick-1.2.5-78.44.1.i586", "product": { "name": "GraphicsMagick-1.2.5-78.44.1.i586", "product_id": "GraphicsMagick-1.2.5-78.44.1.i586" } }, { "category": "product_version", "name": "libGraphicsMagick2-1.2.5-78.44.1.i586", "product": { "name": "libGraphicsMagick2-1.2.5-78.44.1.i586", "product_id": "libGraphicsMagick2-1.2.5-78.44.1.i586" } }, { "category": "product_version", "name": "perl-GraphicsMagick-1.2.5-78.44.1.i586", "product": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.i586", "product_id": "perl-GraphicsMagick-1.2.5-78.44.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "GraphicsMagick-1.2.5-78.44.1.ia64", "product": { "name": "GraphicsMagick-1.2.5-78.44.1.ia64", "product_id": "GraphicsMagick-1.2.5-78.44.1.ia64" } }, { "category": "product_version", "name": "libGraphicsMagick2-1.2.5-78.44.1.ia64", "product": { "name": "libGraphicsMagick2-1.2.5-78.44.1.ia64", "product_id": "libGraphicsMagick2-1.2.5-78.44.1.ia64" } }, { "category": "product_version", "name": "perl-GraphicsMagick-1.2.5-78.44.1.ia64", "product": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.ia64", "product_id": "perl-GraphicsMagick-1.2.5-78.44.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "GraphicsMagick-1.2.5-78.44.1.ppc64", "product": { "name": "GraphicsMagick-1.2.5-78.44.1.ppc64", "product_id": "GraphicsMagick-1.2.5-78.44.1.ppc64" } }, { "category": "product_version", "name": "libGraphicsMagick2-1.2.5-78.44.1.ppc64", "product": { "name": "libGraphicsMagick2-1.2.5-78.44.1.ppc64", "product_id": "libGraphicsMagick2-1.2.5-78.44.1.ppc64" } }, { "category": "product_version", "name": "perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "product": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "product_id": "perl-GraphicsMagick-1.2.5-78.44.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "GraphicsMagick-1.2.5-78.44.1.s390x", "product": { "name": "GraphicsMagick-1.2.5-78.44.1.s390x", "product_id": "GraphicsMagick-1.2.5-78.44.1.s390x" } }, { "category": "product_version", "name": "libGraphicsMagick2-1.2.5-78.44.1.s390x", "product": { "name": "libGraphicsMagick2-1.2.5-78.44.1.s390x", "product_id": "libGraphicsMagick2-1.2.5-78.44.1.s390x" } }, { "category": "product_version", "name": "perl-GraphicsMagick-1.2.5-78.44.1.s390x", "product": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.s390x", "product_id": "perl-GraphicsMagick-1.2.5-78.44.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "GraphicsMagick-1.2.5-78.44.1.x86_64", "product": { "name": "GraphicsMagick-1.2.5-78.44.1.x86_64", "product_id": "GraphicsMagick-1.2.5-78.44.1.x86_64" } }, { "category": "product_version", "name": "libGraphicsMagick2-1.2.5-78.44.1.x86_64", "product": { "name": "libGraphicsMagick2-1.2.5-78.44.1.x86_64", "product_id": "libGraphicsMagick2-1.2.5-78.44.1.x86_64" } }, { "category": "product_version", "name": "perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "product": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "product_id": "perl-GraphicsMagick-1.2.5-78.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "GraphicsMagick-1.2.5-78.44.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586" }, "product_reference": "GraphicsMagick-1.2.5-78.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "GraphicsMagick-1.2.5-78.44.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64" }, "product_reference": "GraphicsMagick-1.2.5-78.44.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "GraphicsMagick-1.2.5-78.44.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64" }, "product_reference": "GraphicsMagick-1.2.5-78.44.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "GraphicsMagick-1.2.5-78.44.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x" }, "product_reference": "GraphicsMagick-1.2.5-78.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "GraphicsMagick-1.2.5-78.44.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64" }, "product_reference": "GraphicsMagick-1.2.5-78.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libGraphicsMagick2-1.2.5-78.44.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586" }, "product_reference": "libGraphicsMagick2-1.2.5-78.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libGraphicsMagick2-1.2.5-78.44.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64" }, "product_reference": "libGraphicsMagick2-1.2.5-78.44.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libGraphicsMagick2-1.2.5-78.44.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64" }, "product_reference": "libGraphicsMagick2-1.2.5-78.44.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libGraphicsMagick2-1.2.5-78.44.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x" }, "product_reference": "libGraphicsMagick2-1.2.5-78.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libGraphicsMagick2-1.2.5-78.44.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64" }, "product_reference": "libGraphicsMagick2-1.2.5-78.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586" }, "product_reference": "perl-GraphicsMagick-1.2.5-78.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64" }, "product_reference": "perl-GraphicsMagick-1.2.5-78.44.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64" }, "product_reference": "perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x" }, "product_reference": "perl-GraphicsMagick-1.2.5-78.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "perl-GraphicsMagick-1.2.5-78.44.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64" }, "product_reference": "perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "GraphicsMagick-1.2.5-78.44.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64" }, "product_reference": "GraphicsMagick-1.2.5-78.44.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGraphicsMagick2-1.2.5-78.44.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" }, "product_reference": "libGraphicsMagick2-1.2.5-78.44.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11524" } ], "notes": [ { "category": "general", "text": "The WriteBlob function in MagickCore/blob.c in ImageMagick before 6.9.8-10 and 7.x before 7.6.0-0 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11524", "url": "https://www.suse.com/security/cve/CVE-2017-11524" }, { "category": "external", "summary": "SUSE Bug 1050087 for CVE-2017-11524", "url": "https://bugzilla.suse.com/1050087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "important" } ], "title": "CVE-2017-11524" }, { "cve": "CVE-2017-12691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12691" } ], "notes": [ { "category": "general", "text": "The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12691", "url": "https://www.suse.com/security/cve/CVE-2017-12691" }, { "category": "external", "summary": "SUSE Bug 1053955 for CVE-2017-12691", "url": "https://bugzilla.suse.com/1053955" }, { "category": "external", "summary": "SUSE Bug 1058422 for CVE-2017-12691", "url": "https://bugzilla.suse.com/1058422" }, { "category": "external", "summary": "SUSE Bug 1082363 for CVE-2017-12691", "url": "https://bugzilla.suse.com/1082363" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "important" } ], "title": "CVE-2017-12691" }, { "cve": "CVE-2017-12693", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12693" } ], "notes": [ { "category": "general", "text": "The ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted BMP file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12693", "url": "https://www.suse.com/security/cve/CVE-2017-12693" }, { "category": "external", "summary": "SUSE Bug 1053955 for CVE-2017-12693", "url": "https://bugzilla.suse.com/1053955" }, { "category": "external", "summary": "SUSE Bug 1082348 for CVE-2017-12693", "url": "https://bugzilla.suse.com/1082348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "important" } ], "title": "CVE-2017-12693" }, { "cve": "CVE-2017-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14314" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the DrawImage function in magick/render.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14314", "url": "https://www.suse.com/security/cve/CVE-2017-14314" }, { "category": "external", "summary": "SUSE Bug 1058630 for CVE-2017-14314", "url": "https://bugzilla.suse.com/1058630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "moderate" } ], "title": "CVE-2017-14314" }, { "cve": "CVE-2017-14343", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14343" } ], "notes": [ { "category": "general", "text": "ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14343", "url": "https://www.suse.com/security/cve/CVE-2017-14343" }, { "category": "external", "summary": "SUSE Bug 1058422 for CVE-2017-14343", "url": "https://bugzilla.suse.com/1058422" }, { "category": "external", "summary": "SUSE Bug 1082363 for CVE-2017-14343", "url": "https://bugzilla.suse.com/1082363" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "low" } ], "title": "CVE-2017-14343" }, { "cve": "CVE-2017-14505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14505" } ], "notes": [ { "category": "general", "text": "DrawGetStrokeDashArray in wand/drawing-wand.c in ImageMagick 7.0.7-1 mishandles certain NULL arrays, which allows attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14505", "url": "https://www.suse.com/security/cve/CVE-2017-14505" }, { "category": "external", "summary": "SUSE Bug 1059735 for CVE-2017-14505", "url": "https://bugzilla.suse.com/1059735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "moderate" } ], "title": "CVE-2017-14505" }, { "cve": "CVE-2017-15016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15016" } ], "notes": [ { "category": "general", "text": "ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadEnhMetaFile in coders/emf.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15016", "url": "https://www.suse.com/security/cve/CVE-2017-15016" }, { "category": "external", "summary": "SUSE Bug 1082291 for CVE-2017-15016", "url": "https://bugzilla.suse.com/1082291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "low" } ], "title": "CVE-2017-15016" }, { "cve": "CVE-2017-15017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15017" } ], "notes": [ { "category": "general", "text": "ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15017", "url": "https://www.suse.com/security/cve/CVE-2017-15017" }, { "category": "external", "summary": "SUSE Bug 1082283 for CVE-2017-15017", "url": "https://bugzilla.suse.com/1082283" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "low" } ], "title": "CVE-2017-15017" }, { "cve": "CVE-2017-16352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16352" } ], "notes": [ { "category": "general", "text": "GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the \"Display visual image directory\" feature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16352", "url": "https://www.suse.com/security/cve/CVE-2017-16352" }, { "category": "external", "summary": "SUSE Bug 1066168 for CVE-2017-16352", "url": "https://bugzilla.suse.com/1066168" }, { "category": "external", "summary": "SUSE Bug 1066170 for CVE-2017-16352", "url": "https://bugzilla.suse.com/1066170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "moderate" } ], "title": "CVE-2017-16352" }, { "cve": "CVE-2017-16353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16353" } ], "notes": [ { "category": "general", "text": "GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16353", "url": "https://www.suse.com/security/cve/CVE-2017-16353" }, { "category": "external", "summary": "SUSE Bug 1066170 for CVE-2017-16353", "url": "https://bugzilla.suse.com/1066170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "moderate" } ], "title": "CVE-2017-16353" }, { "cve": "CVE-2017-18219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18219" } ], "notes": [ { "category": "general", "text": "An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted file that triggers an attempt at a large png_pixels array allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18219", "url": "https://www.suse.com/security/cve/CVE-2017-18219" }, { "category": "external", "summary": "SUSE Bug 1084060 for CVE-2017-18219", "url": "https://bugzilla.suse.com/1084060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "low" } ], "title": "CVE-2017-18219" }, { "cve": "CVE-2017-18220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18220" } ], "notes": [ { "category": "general", "text": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18220", "url": "https://www.suse.com/security/cve/CVE-2017-18220" }, { "category": "external", "summary": "SUSE Bug 1084062 for CVE-2017-18220", "url": "https://bugzilla.suse.com/1084062" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "moderate" } ], "title": "CVE-2017-18220" }, { "cve": "CVE-2017-18230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18230" } ], "notes": [ { "category": "general", "text": "An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadCINEONImage in coders/cineon.c, which allows attackers to cause a denial of service via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18230", "url": "https://www.suse.com/security/cve/CVE-2017-18230" }, { "category": "external", "summary": "SUSE Bug 1085233 for CVE-2017-18230", "url": "https://bugzilla.suse.com/1085233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libGraphicsMagick2-1.2.5-78.44.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:perl-GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:GraphicsMagick-1.2.5-78.44.1.x86_64", "SUSE Studio Onsite 1.3:libGraphicsMagick2-1.2.5-78.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-03T15:17:14Z", "details": "low" } ], "title": "CVE-2017-18230" } ] }
fkie_cve-2017-18220
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
graphicsmagick | graphicsmagick | 1.3.26 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "4C227898-C6EC-41BE-A3AD-229FFD8B86D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403." }, { "lang": "es", "value": "Las funciones ReadOneJNGImage y ReadJNGImage en coders/png.c en GraphicsMagick 1.3.26 permiten que atacantes remotos provoquen una denegaci\u00f3n de servicio (DoS) (uso de memoria previamente liberada en CloseBlob en magick/blob.c) u otro tipo de impacto sin especificar mediante un archivo manipulado. Este problema est\u00e1 relacionado con CVE-2017-11403." } ], "id": "CVE-2017-18220", "lastModified": "2024-11-21T03:19:36.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-05T22:29:00.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103276" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2018/dsa-4321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://sourceforge.net/p/graphicsmagick/bugs/438/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4321" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.