Twenty Year Anniversary

Ubuntu Security Notice USN-3681-1

Ubuntu Security Notice USN-3681-1
Posted Jun 12, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3681-1 - It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2017-1000445, CVE-2017-1000476, CVE-2017-10995, CVE-2017-11352, CVE-2017-11533, CVE-2017-11535, CVE-2017-11537, CVE-2017-11639, CVE-2017-11640, CVE-2017-12140, CVE-2017-12418, CVE-2017-12429, CVE-2017-12430, CVE-2017-12431, CVE-2017-12432, CVE-2017-12433, CVE-2017-12435, CVE-2017-12563, CVE-2017-12587, CVE-2017-12640, CVE-2017-12643, CVE-2017-12644, CVE-2017-12670, CVE-2017-12674, CVE-2017-12691, CVE-2017-12692
MD5 | 46d66c11518d687dd07ed69be074f87d

Ubuntu Security Notice USN-3681-1

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-3681-1
June 12, 2018

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
imagemagick 8:6.9.7.4+dfsg-16ubuntu6.2
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.2
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.2
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.2
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.2

Ubuntu 17.10:
imagemagick 8:6.9.7.4+dfsg-16ubuntu2.2
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu2.2
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu2.2
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu2.2
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu2.2

Ubuntu 16.04 LTS:
imagemagick 8:6.8.9.9-7ubuntu5.11
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.11
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.11
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.11
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.11

Ubuntu 14.04 LTS:
imagemagick 8:6.7.7.10-6ubuntu3.11
libmagick++5 8:6.7.7.10-6ubuntu3.11
libmagickcore5 8:6.7.7.10-6ubuntu3.11
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.11

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3681-1
CVE-2017-1000445, CVE-2017-1000476, CVE-2017-10995, CVE-2017-11352,
CVE-2017-11533, CVE-2017-11535, CVE-2017-11537, CVE-2017-11639,
CVE-2017-11640, CVE-2017-12140, CVE-2017-12418, CVE-2017-12429,
CVE-2017-12430, CVE-2017-12431, CVE-2017-12432, CVE-2017-12433,
CVE-2017-12435, CVE-2017-12563, CVE-2017-12587, CVE-2017-12640,
CVE-2017-12643, CVE-2017-12644, CVE-2017-12670, CVE-2017-12674,
CVE-2017-12691, CVE-2017-12692, CVE-2017-12693, CVE-2017-12875,
CVE-2017-12877, CVE-2017-12983, CVE-2017-13058, CVE-2017-13059,
CVE-2017-13060, CVE-2017-13061, CVE-2017-13062, CVE-2017-13131,
CVE-2017-13134, CVE-2017-13139, CVE-2017-13142, CVE-2017-13143,
CVE-2017-13144, CVE-2017-13145, CVE-2017-13758, CVE-2017-13768,
CVE-2017-13769, CVE-2017-14060, CVE-2017-14172, CVE-2017-14173,
CVE-2017-14174, CVE-2017-14175, CVE-2017-14224, CVE-2017-14249,
CVE-2017-14325, CVE-2017-14326, CVE-2017-14341, CVE-2017-14342,
CVE-2017-14343, CVE-2017-14400, CVE-2017-14505, CVE-2017-14531,
CVE-2017-14532, CVE-2017-14533, CVE-2017-14607, CVE-2017-14624,
CVE-2017-14625, CVE-2017-14626, CVE-2017-14682, CVE-2017-14684,
CVE-2017-14739, CVE-2017-14741, CVE-2017-14989, CVE-2017-15015,
CVE-2017-15016, CVE-2017-15017, CVE-2017-15032, CVE-2017-15033,
CVE-2017-15217, CVE-2017-15218, CVE-2017-15277, CVE-2017-15281,
CVE-2017-16546, CVE-2017-17499, CVE-2017-17504, CVE-2017-17680,
CVE-2017-17681, CVE-2017-17682, CVE-2017-17879, CVE-2017-17881,
CVE-2017-17882, CVE-2017-17884, CVE-2017-17885, CVE-2017-17886,
CVE-2017-17887, CVE-2017-17914, CVE-2017-17934, CVE-2017-18008,
CVE-2017-18022, CVE-2017-18027, CVE-2017-18028, CVE-2017-18029,
CVE-2017-18209, CVE-2017-18211, CVE-2017-18251, CVE-2017-18252,
CVE-2017-18254, CVE-2017-18271, CVE-2017-18273, CVE-2018-10177,
CVE-2018-10804, CVE-2018-10805, CVE-2018-11251, CVE-2018-11625,
CVE-2018-11655, CVE-2018-11656, CVE-2018-5246, CVE-2018-5247,
CVE-2018-5248, CVE-2018-5357, CVE-2018-5358, CVE-2018-6405,
CVE-2018-7443, CVE-2018-8804, CVE-2018-8960, CVE-2018-9133

Package Information:
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu6.2
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu2.2
https://launchpad.net/ubuntu/+source/imagemagick/8:6.8.9.9-7ubuntu5.11
https://launchpad.net/ubuntu/+source/imagemagick/8:6.7.7.10-6ubuntu3.11

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close