-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-5335-1.json
140 lines (140 loc) · 5.41 KB
/
USN-5335-1.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
{
"id": "USN-5335-1",
"summary": "imagemagick vulnerabilities",
"details": "It was discovered that ImageMagick incorrectly handled certain values\nwhen processing XPM image data or large images. If a user or automated\nsystem using ImageMagick were tricked into opening a specially crafted\nimage, an attacker could exploit this to cause a denial of service or\npossibly execute code with the privileges of the user invoking the program.\n(CVE-2020-19667, CVE-2017-13144)\n\nSuhwan Song discovered that ImageMagick incorrectly handled memory\nwhen processing PNG,PALM,MIFF image data. If a user or automated system\nusing ImageMagick were tricked into opening a specially crafted image,\nan attacker could exploit this to cause a denial of service or possibly\nexecute code with the privileges of the user invoking the program.\n(CVE-2020-25664, CVE-2020-25665, CVE-2020-25674, CVE-2020-27753)\n\nSuhwan Song discovered that ImageMagick incorrectly handled certain values\nwhen processing image data. If a user or automated system using\nImageMagick were tricked into opening a specially crafted image, an\nattacker could exploit this to cause a denial of service.\n(CVE-2020-25676, CVE-2020-27750, CVE-2020-27760, CVE-2020-27762,\nCVE-2020-27766, CVE-2020-27770)\n\nZhang Xiaohui discovered that ImageMagick incorrectly handled certain values\nwhen processing image data. If a user or automated system using\nImageMagick were tricked into opening a specially crafted image, an\nattacker could exploit this to cause a denial of service.\n(CVE-2021-20176, CVE-2021-20241, CVE-2021-20243)\n",
"aliases": [],
"related": [
"CVE-2017-13144",
"CVE-2020-19667",
"CVE-2020-25664",
"CVE-2020-25665",
"CVE-2020-25674",
"CVE-2020-25676",
"CVE-2020-27750",
"CVE-2020-27753",
"CVE-2020-27760",
"CVE-2020-27762",
"CVE-2020-27766",
"CVE-2020-27770",
"CVE-2021-20176",
"CVE-2021-20241",
"CVE-2021-20243"
],
"published": "2022-03-18T11:18:34.498816Z",
"modified": "2022-03-18T11:18:34.498816Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"name": "imagemagick"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "8:6.8.9.9-7ubuntu5.16+esm2"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"imagemagick-common": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickcore-6.q16-dev": "8:6.8.9.9-7ubuntu5.16+esm2",
"imagemagick": "8:6.8.9.9-7ubuntu5.16+esm2",
"imagemagick-doc": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickwand-6.q16-dev": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagick++-6-headers": "8:6.8.9.9-7ubuntu5.16+esm2",
"libimage-magick-q16-perl": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickwand-dev": "8:6.8.9.9-7ubuntu5.16+esm2",
"libimage-magick-perl": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagick++-dev": "8:6.8.9.9-7ubuntu5.16+esm2",
"imagemagick-6.q16": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagick++-6.q16-5v5": "8:6.8.9.9-7ubuntu5.16+esm2",
"perlmagick": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickwand-6.q16-2": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickcore-6-headers": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickcore-6-arch-config": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagick++-6.q16-dev": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickcore-6.q16-2-extra": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickcore-dev": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickwand-6-headers": "8:6.8.9.9-7ubuntu5.16+esm2",
"libmagickcore-6.q16-2": "8:6.8.9.9-7ubuntu5.16+esm2"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-5335-1"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2017-13144"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-19667"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-25664"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-25665"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-25674"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-25676"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-27750"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-27753"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-27760"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-27762"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-27766"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2020-27770"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-20176"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-20241"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-20243"
}
]
}