Debian Security Advisory
DLA-1159-1 graphicsmagick -- LTS security update
- Date Reported:
- 03 Nov 2017
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-16352, CVE-2017-16353.
- More information:
Maor Shwartz, Jeremy Heng and Terry Chia discovered two security vulnerabilities in Graphicsmagick, a collection of image processing tool s.
Graphicsmagick was vulnerable to a heap-based buffer overflow vulnerability found in the
Display visual image directoryfeature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag.
Graphicsmagick was vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.
For Debian 7
Wheezy, these problems have been fixed in version 1.3.16-1.1+deb7u13.
We recommend that you upgrade your graphicsmagick packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS