{"affected":[{"ecosystem_specific":{"binaries":[{"ImageMagick":"6.4.3.6-78.40.1","ImageMagick-devel":"6.4.3.6-78.40.1","libMagick++-devel":"6.4.3.6-78.40.1","libMagick++1":"6.4.3.6-78.40.1","libMagickWand1":"6.4.3.6-78.40.1","libMagickWand1-32bit":"6.4.3.6-78.40.1","perl-PerlMagick":"6.4.3.6-78.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-78.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore1":"6.4.3.6-78.40.1","libMagickCore1-32bit":"6.4.3.6-78.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-78.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libMagickCore1":"6.4.3.6-78.40.1","libMagickCore1-32bit":"6.4.3.6-78.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"ImageMagick","purl":"pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.3.6-78.40.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ImageMagick fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8804: The WriteEPTImage function allowed remote attackers to cause a\n  denial of service (double free and application crash) or possibly have\n  unspecified other impact via a crafted file (bsc#1086011)\n- CVE-2017-11524: The WriteBlob function allowed remote attackers to cause a\n  denial of service (assertion failure and application exit) via a crafted file\n  (bsc#1050087)\n- CVE-2017-18219: Prevent allocation failure in the function ReadOnePNGImage,\n  which allowed attackers to cause a denial of service via a crafted file that\n  triggers an attempt at a large png_pixels array allocation (bsc#1084060).\n- CVE-2017-9500: Prevent assertion failure in the function\n  ResetImageProfileIterator, which allowed attackers to cause a denial of service\n  via a crafted file (bsc#1043290)\n- CVE-2017-16353: Prevent memory information disclosure in the DescribeImage\n  function caused by a heap-based buffer over-read. The portion of the code\n  containing the vulnerability is responsible for printing the IPTC Profile\n  information contained in the image. This vulnerability can be triggered with a\n  specially crafted MIFF file. There is an out-of-bounds buffer dereference\n  because certain increments were never checked (bsc#1066170)\n- CVE-2017-16352: Prevent a heap-based buffer overflow in the 'Display visual\n  image directory' feature of the DescribeImage() function. One possible way to\n  trigger the vulnerability is to run the identify command on a specially crafted\n  MIFF format file with the verbose flag (bsc#1066168)\n- CVE-2017-14314: Prevent off-by-one error in the DrawImage function that\n  allowed remote attackers to cause a denial of service (DrawDashPolygon\n  heap-based buffer over-read and application crash) via a crafted file\n  (bsc#1058630)\n- CVE-2017-13768: Prevent NULL pointer dereference in the IdentifyImage\n  function that allowed an attacker to perform denial of service by sending a\n  crafted image file (bsc#1056434)\n- CVE-2017-14505: Fixed handling of NULL arrays, which allowed attackers to\n  perform Denial of Service (NULL pointer dereference and application crash in\n  AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image\n  File as input (bsc#1059735)\n- CVE-2018-7443: The ReadTIFFImage function did not properly validate the\n  amount of image data in a file, which allowed remote attackers to cause a\n  denial of service (memory allocation failure in the AcquireMagickMemory\n  function in MagickCore/memory.c) (bsc#1082792)\n- CVE-2017-15016: Prevent NULL pointer dereference vulnerability in\n  ReadEnhMetaFile allowing for denial of service (bsc#1082291)\n- CVE-2017-15017: Prevent NULL pointer dereference vulnerability in\n  ReadOneMNGImage allowing for denial of service (bsc#1082283)\n- CVE-2017-12692: The ReadVIFFImage function allowed remote attackers to cause\n  a denial of service (memory consumption) via a crafted VIFF file (bsc#1082362)\n- CVE-2017-12693: The ReadBMPImage function allowed remote attackers to cause a\n  denial of service (memory consumption) via a crafted BMP file (bsc#1082348)\n  ","id":"SUSE-SU-2018:0880-1","modified":"2018-04-05T15:23:37Z","published":"2018-04-05T15:23:37Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20180880-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1043290"},{"type":"REPORT","url":"https://bugzilla.suse.com/1050087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1056434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1058630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1059735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1066168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1066170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082283"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082291"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082362"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1084060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1086011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11524"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-13768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-14314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-14343"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-14505"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-15016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-15017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16352"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-16353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-18219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-9500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7443"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-8804"}],"related":["CVE-2017-11524","CVE-2017-12691","CVE-2017-12692","CVE-2017-12693","CVE-2017-13768","CVE-2017-14314","CVE-2017-14343","CVE-2017-14505","CVE-2017-15016","CVE-2017-15017","CVE-2017-16352","CVE-2017-16353","CVE-2017-18219","CVE-2017-9500","CVE-2018-7443","CVE-2018-8804"],"summary":"Security update for ImageMagick","upstream":["CVE-2017-11524","CVE-2017-12691","CVE-2017-12692","CVE-2017-12693","CVE-2017-13768","CVE-2017-14314","CVE-2017-14343","CVE-2017-14505","CVE-2017-15016","CVE-2017-15017","CVE-2017-16352","CVE-2017-16353","CVE-2017-18219","CVE-2017-9500","CVE-2018-7443","CVE-2018-8804"]}