RHEL 7:ImageMagick (RHSA-2020:1180)

critical Nessus 插件 ID 135041
全新!插件严重性现在使用 CVSS v3

计算的插件严重性默认已更新为使用 CVSS v3。没有 CVSS v3 分数的插件将回退到 CVSS v2 来计算严重性。可以在设置下拉列表中切换严重性显示首选项。

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 7 主机上安装的程序包受到 RHSA-2020:1180 公告中提及的多个漏洞的影响。

- ImageMagick:coders/dds.c 的 ReadDDSInfo 函数中存在 CPU 耗尽漏洞 (CVE-2017-1000476)

- ImageMagick:coders/xwd.c 的 ReadXWDImage 函数中存在内存泄露漏洞 (CVE-2017-11166)

- ImageMagick:ReadTIFFImage 函数中出现内存耗尽,导致拒绝服务 (CVE-2017-12805)

- ImageMagick:format8BIM 函数中出现内存耗尽,导致拒绝服务 (CVE-2017-12806)

- ImageMagick:coders/pcd.c 的 ReadPCDImage 函数中出现内存泄露 (CVE-2017-18251)

- ImageMagick:MagickWand/mogrify.c 的 MogrifyImageList 函数中出现断言失败 (CVE-2017-18252)

- ImageMagick:coders/gif.c 的 WriteGIFImage 函数中出现内存泄露 (CVE-2017-18254)

- ImageMagick:coders/miff.c 的 ReadMIFFImage 函数中存在无限循环 (CVE-2017-18271)

- ImageMagick:coders/txt.c 的 ReadTXTImage 函数中存在无限循环 (CVE-2017-18273)

- ImageMagick:攻击者可借助 coders/png.c:ReadOneMNGImage() 中的无限循环,通过构建的 MNG 文件造成拒绝服务 (CVE-2018-10177)

- ImageMagick:WriteTIFFImage 中出现内存泄漏 (CVE-2018-10804)

- ImageMagick:ReadYCBCRImage 中出现内存泄漏 (CVE-2018-10805)

- ImageMagick:coders/dcm.c 的 ReadDCMImage 函数中出现内存泄漏 (CVE-2018-11656)

- ImageMagick:coders/bmp.c 的 ReadBMPImage 和 WriteBMPImage 中出现越界写入 (CVE-2018-12599)

- ImageMagick:coders/dib.c 的 ReadDIBImage 和 WriteDIBImage 中出现越界写入 (CVE-2018-12600)

- ImageMagick:MagickCore/animate.c 的 XMagickCommand 函数中出现内存泄漏 (CVE-2018-13153)

- ImageMagick:coders/mpc.c 的 WriteMPCImage 中出现针对颜色映射的内存泄露问题 (CVE-2018-14434)

- ImageMagick:coders/pcd.c 的 DecodeImage 中出现内存泄漏 (CVE-2018-14435)

- ImageMagick:coders/miff.c 的 ReadMIFFImage 中出现内存泄漏 (CVE-2018-14436)

- ImageMagick:coders/meta.c 的 parse8BIM 中出现内存泄漏 (CVE-2018-14437)

- ImageMagick:通过构建的输入文件造成 CPU 耗尽 (CVE-2018-15607)

- ImageMagick:MagickCore/log.c 的 CheckEventLogging 函数中存在空指针取消引用 (CVE-2018-16328)

- ImageMagick:coders/png.c 的 ReadOneJNGImage 中存在可访问断言 (CVE-2018-16749)

- ImageMagick:coders/meta.c 的 formatIPTCfromBuffer 函数中出现内存泄露 (CVE-2018-16750)

- ImageMagick:coders/msl.c 的 WriteMSLImage 中出现内存泄漏 (CVE-2018-18544)

- ImageMagick:coders/bmp.c 中存在无限循环 (CVE-2018-20467)

- ImageMagick:coders/ept.c 的 WriteEPTImage 函数中发生双重释放 (CVE-2018-8804)

- ImageMagick:coders/tiff.c 的 DecodeLabImage 和 EncodeLabImage 函数中存在过度迭代 (CVE-2018-9133)

- ImageMagick:coders/meta.c 的 formatIPTCfromBuffer 函数中存在差一读取 (CVE-2019-10131)

- ImageMagick:coders/tiff.c 的 WriteTIFFImage 中存在基于堆的缓冲区过度读取,此问题会导致拒绝服务,或通过构建的图像文件造成信息泄露 (CVE-2019-10650)

- ImageMagick:cineon 解析组件中存在拒绝服务 (CVE-2019-11470)

- ImageMagick:在 XWD 图像解析组件中,coders/xwd.c 的 ReadXWDImage 中存在拒绝服务 (CVE-2019-11472)

- ImageMagick:coders/tiff.c 的 WriteTIFFImage 函数中存在基于堆的缓冲区过度读取,此问题会导致 DoS 或信息泄露 (CVE-2019-11597)

- ImageMagick:coders/pnm.c 的 WritePNMImage 函数中存在基于堆的缓冲区过度读取,此问题会导致 DoS 或信息泄露 (CVE-2019-11598)

- imagemagick:coders/pango.c 的 ReadPANGOImage 函数和 coders/vid.c 的 ReadVIDImage 中存在空指针取消引用,会导致拒绝服务 (CVE-2019-12974)

- imagemagick:coders/dpx.c 的 WriteDPXImage 函数中存在内存泄露漏洞 (CVE-2019-12975)

- imagemagick:coders/pcl.c 的 ReadPCLImage 函数中存在内存泄露漏洞 (CVE-2019-12976)

- imagemagick:coders/pango.c 的 ReadPANGOImage 函数使用未初始化的值(CVE-2019-12978)

- imagemagick:MagickCore/image.c 的 functionSyncImageSettings 使用未初始化的值 (CVE-2019-12979)

- ImageMagick:coders/bmp.c 的 ReadBMPImage 函数中存在内存泄露漏洞 (CVE-2019-13133)

- ImageMagick:coders/viff.c 的 ReadVIFFImage 函数中存在内存泄露漏洞 (CVE-2019-13134)

- ImageMagick:ReadCUTImage 函数中存在“使用未初始化的值”漏洞,此漏洞会造成崩溃和 DoS (CVE-2019-13135)

- ImageMagick:AdaptiveThresholdImage 的 MagickCore/threshold.c 存在基于堆的缓存区过度读取,这是零宽度处理不当所致 (CVE-2019-13295)

- ImageMagick:AdaptiveThresholdImage 的 MagickCore/threshold.c 存在基于堆的缓存区过度读取,这是零高度处理不当所致 (CVE-2019-13297)

- ImageMagick:EvaluateImages 中的 MagickCore/statistic.c 存在基于堆的缓存区溢出,这是列处理不当所致 (CVE-2019-13300)

- ImageMagick:AcquireMagickMemory 中出现内存泄露 (CVE-2019-13301)

- ImageMagick:WritePNMImage 的 coders/pnm.c 存在基于堆栈的缓冲区溢出,这是分配错放所致 (CVE-2019-13304)

- ImageMagick:WritePNMImage 的 coders/pnm.c 存在基于堆栈的缓冲区溢出,这是 strncpy 错放和差一错误所致 (CVE-2019-13305)

- ImageMagick:WritePNMImage 的 coders/pnm.c 存在基于堆栈的缓冲区溢出,这是差一错误所致 (CVE-2019-13306)

- ImageMagick:EvaluateImages 中的 MagickCore/statistic.c 存在基于堆的缓存区溢出,这是行处理不当所致 (CVE-2019-13307)

- ImageMagick:AcquireMagickMemory 出现内存泄露,这是因为未正确处理 CLIListOperatorImages 中的 NoSuchImage 错误 (CVE-2019-13309)

- ImageMagick:AcquireMagickMemory 出现内存泄露,这是 MagickWand/mogrify.c 中的错误所致 (CVE-2019-13310)

- ImageMagick:AcquireMagickMemory 出现内存泄露,这是 wand/mogrify.c error 错误所致 (CVE-2019-13311)

- ImageMagick:MagickCore/layer.c 的 RemoveDuplicateLayers 中存在除零问题 (CVE-2019-13454)

- ImageMagick:拒绝服务的 magick/blob.c resulting 中存在释放后使用 (CVE-2019-14980)

- ImageMagick:MagickCore/feature.c 的 MeanShiftImage 中存在除零问题 (CVE-2019-14981)

- ImageMagick:coders/xwd.c 的 ReadXWDImage 中存在越界读取 (CVE-2019-15139)

- ImageMagick:coders/mat.c 的 ReadMATImage 中存在释放后使用 (CVE-2019-15140)

- ImageMagick:coders/tiff.c 的 WriteTIFFImage 中存在基于堆的缓冲区溢出 (CVE-2019-15141)

- ImageMagick:magick/xwindow.c 中出现内存泄露 (CVE-2019-16708)

- ImageMagick:coders/dps.c 中出现内存泄露 (CVE-2019-16709)

- ImageMagick:coders/dot.c 中出现内存泄露(CVE-2019-16710、CVE-2019-16713)

- ImageMagick:coders/ps2.c 的 Huffman2DEncodeImage 中出现内存泄露 (CVE-2019-16711)

- ImageMagick:coders/ps3.c 的 Huffman2DEncodeImage 中出现内存泄露 (CVE-2019-16712)

- ImageMagick:coders/ps.c 的 ReadPSInfo 中存在基于堆的缓冲区溢出 (CVE-2019-17540)

- ImageMagick:coders/jpeg.c 的 ReadICCProfile 函数中存在释放后使用 (CVE-2019-17541)

- ImageMagick:coders/sgi.c 的 WriteSGIImage 中存在基于堆的缓冲区溢出 (CVE-2019-19948)

- ImageMagick:coders/png.c 的 WritePNGImage 中存在基于堆的缓冲区过度读取 (CVE-2019-19949)

- imagemagick:coders/pcd.c 的 DecodeImage 函数中出现内存泄漏 (CVE-2019-7175)

- ImageMagick:coders/pdf.c 的 WritePDFImage 函数中出现内存泄露 (CVE-2019-7397)

- ImageMagick:coders/dib.c 的 WriteDIBImage 函数中出现内存泄露 (CVE-2019-7398)

- imagemagick:coders/ps.c 的 PopHexPixel 函数中存在基于堆栈的缓冲区溢出 (CVE-2019-9956)

请注意,Nessus 并未测试此问题,而是只依靠应用程序自我报告的版本号。

解决方案

更新受影响的程序包。

另见

https://cwe.mitre.org/data/definitions/20.html

https://cwe.mitre.org/data/definitions/119.html

https://cwe.mitre.org/data/definitions/121.html

https://cwe.mitre.org/data/definitions/122.html

https://cwe.mitre.org/data/definitions/125.html

https://cwe.mitre.org/data/definitions/193.html

https://cwe.mitre.org/data/definitions/200.html

https://cwe.mitre.org/data/definitions/248.html

https://cwe.mitre.org/data/definitions/369.html

https://cwe.mitre.org/data/definitions/400.html

https://cwe.mitre.org/data/definitions/401.html

https://cwe.mitre.org/data/definitions/416.html

https://cwe.mitre.org/data/definitions/456.html

https://cwe.mitre.org/data/definitions/476.html

https://cwe.mitre.org/data/definitions/617.html

https://cwe.mitre.org/data/definitions/772.html

https://cwe.mitre.org/data/definitions/787.html

https://cwe.mitre.org/data/definitions/835.html

https://access.redhat.com/security/cve/CVE-2017-11166

https://access.redhat.com/security/cve/CVE-2017-12805

https://access.redhat.com/security/cve/CVE-2017-12806

https://access.redhat.com/security/cve/CVE-2017-18251

https://access.redhat.com/security/cve/CVE-2017-18252

https://access.redhat.com/security/cve/CVE-2017-18254

https://access.redhat.com/security/cve/CVE-2017-18271

https://access.redhat.com/security/cve/CVE-2017-18273

https://access.redhat.com/security/cve/CVE-2017-1000476

https://access.redhat.com/security/cve/CVE-2018-8804

https://access.redhat.com/security/cve/CVE-2018-9133

https://access.redhat.com/security/cve/CVE-2018-10177

https://access.redhat.com/security/cve/CVE-2018-10804

https://access.redhat.com/security/cve/CVE-2018-10805

https://access.redhat.com/security/cve/CVE-2018-11656

https://access.redhat.com/security/cve/CVE-2018-12599

https://access.redhat.com/security/cve/CVE-2018-12600

https://access.redhat.com/security/cve/CVE-2018-13153

https://access.redhat.com/security/cve/CVE-2018-14434

https://access.redhat.com/security/cve/CVE-2018-14435

https://access.redhat.com/security/cve/CVE-2018-14436

https://access.redhat.com/security/cve/CVE-2018-14437

https://access.redhat.com/security/cve/CVE-2018-15607

https://access.redhat.com/security/cve/CVE-2018-16328

https://access.redhat.com/security/cve/CVE-2018-16640

https://access.redhat.com/security/cve/CVE-2018-16642

https://access.redhat.com/security/cve/CVE-2018-16643

https://access.redhat.com/security/cve/CVE-2018-16644

https://access.redhat.com/security/cve/CVE-2018-16645

https://access.redhat.com/security/cve/CVE-2018-16749

https://access.redhat.com/security/cve/CVE-2018-16750

https://access.redhat.com/security/cve/CVE-2018-17966

https://access.redhat.com/security/cve/CVE-2018-17967

https://access.redhat.com/security/cve/CVE-2018-18016

https://access.redhat.com/security/cve/CVE-2018-18024

https://access.redhat.com/security/cve/CVE-2018-18544

https://access.redhat.com/security/cve/CVE-2018-20467

https://access.redhat.com/security/cve/CVE-2019-7175

https://access.redhat.com/security/cve/CVE-2019-7397

https://access.redhat.com/security/cve/CVE-2019-7398

https://access.redhat.com/security/cve/CVE-2019-9956

https://access.redhat.com/security/cve/CVE-2019-10131

https://access.redhat.com/security/cve/CVE-2019-10650

https://access.redhat.com/security/cve/CVE-2019-11470

https://access.redhat.com/security/cve/CVE-2019-11472

https://access.redhat.com/security/cve/CVE-2019-11597

https://access.redhat.com/security/cve/CVE-2019-11598

https://access.redhat.com/security/cve/CVE-2019-12974

https://access.redhat.com/security/cve/CVE-2019-12975

https://access.redhat.com/security/cve/CVE-2019-12976

https://access.redhat.com/security/cve/CVE-2019-12978

https://access.redhat.com/security/cve/CVE-2019-12979

https://access.redhat.com/security/cve/CVE-2019-13133

https://access.redhat.com/security/cve/CVE-2019-13134

https://access.redhat.com/security/cve/CVE-2019-13135

https://access.redhat.com/security/cve/CVE-2019-13295

https://access.redhat.com/security/cve/CVE-2019-13297

https://access.redhat.com/security/cve/CVE-2019-13300

https://access.redhat.com/security/cve/CVE-2019-13301

https://access.redhat.com/security/cve/CVE-2019-13304

https://access.redhat.com/security/cve/CVE-2019-13305

https://access.redhat.com/security/cve/CVE-2019-13306

https://access.redhat.com/security/cve/CVE-2019-13307

https://access.redhat.com/security/cve/CVE-2019-13309

https://access.redhat.com/security/cve/CVE-2019-13310

https://access.redhat.com/security/cve/CVE-2019-13311

https://access.redhat.com/security/cve/CVE-2019-13454

https://access.redhat.com/security/cve/CVE-2019-14980

https://access.redhat.com/security/cve/CVE-2019-14981

https://access.redhat.com/security/cve/CVE-2019-15139

https://access.redhat.com/security/cve/CVE-2019-15140

https://access.redhat.com/security/cve/CVE-2019-15141

https://access.redhat.com/security/cve/CVE-2019-16708

https://access.redhat.com/security/cve/CVE-2019-16709

https://access.redhat.com/security/cve/CVE-2019-16710

https://access.redhat.com/security/cve/CVE-2019-16711

https://access.redhat.com/security/cve/CVE-2019-16712

https://access.redhat.com/security/cve/CVE-2019-16713

https://access.redhat.com/security/cve/CVE-2019-17540

https://access.redhat.com/security/cve/CVE-2019-17541

https://access.redhat.com/security/cve/CVE-2019-19948

https://access.redhat.com/security/cve/CVE-2019-19949

https://access.redhat.com/errata/RHSA-2020:1180

https://bugzilla.redhat.com/1532845

https://bugzilla.redhat.com/1559892

https://bugzilla.redhat.com/1561741

https://bugzilla.redhat.com/1561742

https://bugzilla.redhat.com/1561744

https://bugzilla.redhat.com/1563875

https://bugzilla.redhat.com/1572044

https://bugzilla.redhat.com/1577398

https://bugzilla.redhat.com/1577399

https://bugzilla.redhat.com/1581486

https://bugzilla.redhat.com/1581489

https://bugzilla.redhat.com/1588170

https://bugzilla.redhat.com/1594338

https://bugzilla.redhat.com/1594339

https://bugzilla.redhat.com/1598471

https://bugzilla.redhat.com/1609933

https://bugzilla.redhat.com/1609936

https://bugzilla.redhat.com/1609939

https://bugzilla.redhat.com/1609942

https://bugzilla.redhat.com/1622738

https://bugzilla.redhat.com/1624955

https://bugzilla.redhat.com/1626570

https://bugzilla.redhat.com/1626591

https://bugzilla.redhat.com/1626599

https://bugzilla.redhat.com/1626606

https://bugzilla.redhat.com/1626611

https://bugzilla.redhat.com/1627916

https://bugzilla.redhat.com/1627917

https://bugzilla.redhat.com/1636579

https://bugzilla.redhat.com/1636587

https://bugzilla.redhat.com/1636590

https://bugzilla.redhat.com/1637189

https://bugzilla.redhat.com/1642614

https://bugzilla.redhat.com/1664845

https://bugzilla.redhat.com/1672560

https://bugzilla.redhat.com/1672564

https://bugzilla.redhat.com/1687436

https://bugzilla.redhat.com/1692300

https://bugzilla.redhat.com/1700755

https://bugzilla.redhat.com/1704762

https://bugzilla.redhat.com/1705406

https://bugzilla.redhat.com/1705414

https://bugzilla.redhat.com/1707768

https://bugzilla.redhat.com/1707770

https://bugzilla.redhat.com/1708517

https://bugzilla.redhat.com/1708521

https://bugzilla.redhat.com/1726078

https://bugzilla.redhat.com/1726081

https://bugzilla.redhat.com/1726104

https://bugzilla.redhat.com/1728474

https://bugzilla.redhat.com/1730329

https://bugzilla.redhat.com/1730333

https://bugzilla.redhat.com/1730337

https://bugzilla.redhat.com/1730351

https://bugzilla.redhat.com/1730357

https://bugzilla.redhat.com/1730361

https://bugzilla.redhat.com/1730364

https://bugzilla.redhat.com/1730575

https://bugzilla.redhat.com/1730580

https://bugzilla.redhat.com/1730596

https://bugzilla.redhat.com/1730604

https://bugzilla.redhat.com/1732278

https://bugzilla.redhat.com/1732282

https://bugzilla.redhat.com/1732284

https://bugzilla.redhat.com/1732292

https://bugzilla.redhat.com/1732294

https://bugzilla.redhat.com/1757779

https://bugzilla.redhat.com/1757911

https://bugzilla.redhat.com/1765330

https://bugzilla.redhat.com/1767087

https://bugzilla.redhat.com/1767802

https://bugzilla.redhat.com/1767812

https://bugzilla.redhat.com/1767828

https://bugzilla.redhat.com/1772643

https://bugzilla.redhat.com/1792480

https://bugzilla.redhat.com/1793177

https://bugzilla.redhat.com/1801661

https://bugzilla.redhat.com/1801665

https://bugzilla.redhat.com/1801667

https://bugzilla.redhat.com/1801673

https://bugzilla.redhat.com/1801674

https://bugzilla.redhat.com/1801681

插件详情

严重性: Critical

ID: 135041

文件名: redhat-RHSA-2020-1180.nasl

版本: 1.6

类型: local

代理: unix

发布时间: 2020/3/31

最近更新时间: 2021/10/13

依存关系: ssh_get_info.nasl, redhat_repos.nasl

风险信息

CVSS 分数来源: CVE-2019-19948

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: High

基本分数: 7.5

时间分数: 5.5

矢量: AV:N/AC:L/Au:N/C:P/I:P/A:P

时间矢量: E:U/RL:OF/RC:C

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.5

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: E:U/RL:O/RC:C

漏洞信息

CPE: cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:ImageMagick, p-cpe:/a:redhat:enterprise_linux:imagemagick-c%2b%2b, p-cpe:/a:redhat:enterprise_linux:imagemagick-c%2b%2b-devel, p-cpe:/a:redhat:enterprise_linux:ImageMagick-devel, p-cpe:/a:redhat:enterprise_linux:ImageMagick-doc, p-cpe:/a:redhat:enterprise_linux:ImageMagick-perl, p-cpe:/a:redhat:enterprise_linux:autotrace, p-cpe:/a:redhat:enterprise_linux:autotrace-devel, p-cpe:/a:redhat:enterprise_linux:emacs, p-cpe:/a:redhat:enterprise_linux:emacs-common, p-cpe:/a:redhat:enterprise_linux:emacs-el, p-cpe:/a:redhat:enterprise_linux:emacs-filesystem, p-cpe:/a:redhat:enterprise_linux:emacs-nox, p-cpe:/a:redhat:enterprise_linux:emacs-terminal, p-cpe:/a:redhat:enterprise_linux:inkscape, p-cpe:/a:redhat:enterprise_linux:inkscape-docs, p-cpe:/a:redhat:enterprise_linux:inkscape-view

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2020/3/31

漏洞发布日期: 2017/7/10

参考资料信息

CVE: CVE-2017-11166, CVE-2017-12805, CVE-2017-12806, CVE-2017-18251, CVE-2017-18252, CVE-2017-18254, CVE-2017-18271, CVE-2017-18273, CVE-2017-1000476, CVE-2018-8804, CVE-2018-9133, CVE-2018-10177, CVE-2018-10804, CVE-2018-10805, CVE-2018-11656, CVE-2018-12599, CVE-2018-12600, CVE-2018-13153, CVE-2018-14434, CVE-2018-14435, CVE-2018-14436, CVE-2018-14437, CVE-2018-15607, CVE-2018-16328, CVE-2018-16749, CVE-2018-16750, CVE-2018-18544, CVE-2018-20467, CVE-2019-7175, CVE-2019-7397, CVE-2019-7398, CVE-2019-9956, CVE-2019-10131, CVE-2019-10650, CVE-2019-11470, CVE-2019-11472, CVE-2019-11597, CVE-2019-11598, CVE-2019-12974, CVE-2019-12975, CVE-2019-12976, CVE-2019-12978, CVE-2019-12979, CVE-2019-13133, CVE-2019-13134, CVE-2019-13135, CVE-2019-13295, CVE-2019-13297, CVE-2019-13300, CVE-2019-13301, CVE-2019-13304, CVE-2019-13305, CVE-2019-13306, CVE-2019-13307, CVE-2019-13309, CVE-2019-13310, CVE-2019-13311, CVE-2019-13454, CVE-2019-14980, CVE-2019-14981, CVE-2019-15139, CVE-2019-15140, CVE-2019-15141, CVE-2019-16708, CVE-2019-16709, CVE-2019-16710, CVE-2019-16711, CVE-2019-16712, CVE-2019-16713, CVE-2019-17540, CVE-2019-17541, CVE-2019-19948, CVE-2019-19949

BID: 102428, 103498, 104591, 104687, 105137, 106268, 106315, 106561, 106847, 106848, 107333, 107546, 107646, 108102, 108117, 108448, 108492, 108913, 109099, 109308, 109362

RHSA: 2020:1180

IAVB: 2019-B-0032-S, 2019-B-0013-S, 2019-B-0056-S, 2019-B-0062-S

CWE: 20, 119, 121, 122, 125, 193, 200, 248, 369, 400, 401, 416, 456, 476, 617, 772, 787, 835