{"affected":[{"ecosystem_specific":{"binaries":[{"ImageMagick":"6.4.3.6-7.78.37.1","ImageMagick-devel":"6.4.3.6-7.78.37.1","libMagick++-devel":"6.4.3.6-7.78.37.1","libMagick++1":"6.4.3.6-7.78.37.1","libMagickWand1":"6.4.3.6-7.78.37.1","libMagickWand1-32bit":"6.4.3.6-7.78.37.1","perl-PerlMagick":"6.4.3.6-7.78.37.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.78.37.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore1":"6.4.3.6-7.78.37.1","libMagickCore1-32bit":"6.4.3.6-7.78.37.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.78.37.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore1":"6.4.3.6-7.78.37.1","libMagickCore1-32bit":"6.4.3.6-7.78.37.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-7.78.37.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ImageMagick fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)\n- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)\n- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)\n- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)\n- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)\n- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)\n","id":"SUSE-SU-2018:0770-1","modified":"2018-03-22T07:18:34Z","published":"2018-03-22T07:18:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1042911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1072898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11528"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11530"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-17682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9405"}],"related":["CVE-2017-11528","CVE-2017-11530","CVE-2017-11533","CVE-2017-12663","CVE-2017-17682","CVE-2017-9405"],"summary":"Security update for ImageMagick","upstream":["CVE-2017-11528","CVE-2017-11530","CVE-2017-11533","CVE-2017-12663","CVE-2017-17682","CVE-2017-9405"]}