Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:129B6A9BB5C74D717E5AB861B666605D
HistoryJun 13, 2016 - 12:00 a.m.

USN-2990-1 ImageMagick vulnerability (a.k.a. ImageTragick) | Cloud Foundry

2016-06-1300:00:00
Cloud Foundry
www.cloudfoundry.org
31

0.971 High

EPSS

Percentile

99.8%

USN-2990-1 ImageMagick vulnerability (a.k.a. ImageTragick)

Medium

Vendor

Imagemagick, Canonical Ubuntu

Versions Affected

Canonical Ubuntu 14.04 LTS

Description

Nikolay Ermishkin and Stewie discovered that ImageMagick incorrectly sanitized untrusted input. A remote attacker could use these issues to execute arbitrary code. These issues are known as β€˜ImageTragick’. This update disables problematic coders via the /etc/ImageMagick-6/policy.xml configuration file. In certain environments the coders may need to be manually re-enabled after making sure that ImageMagick does not process untrusted input. (CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718)

Bob Friesenhahn discovered that ImageMagick allowed injecting commands via an image file or filename. A remote attacker could use this issue to execute arbitrary code. (CVE-2016-5118)

Affected Products and Versions

_Severity is medium unless otherwise noted.
_

  • All versions of Cloud Foundry cflinuxfs2 prior to v.1.65.0

Mitigation

Users of affected versions should apply the following mitigation:

  • The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 v.1.65.0 or later versions

Credit

Stewie, Nikolay Ermishkin, Bob Friesenhahn

References