Lucene search

K
debianDebianDEBIAN:DSA-4640-1:F515D
HistoryMar 15, 2020 - 10:20 p.m.

[SECURITY] [DSA 4640-1] graphicsmagick security update

2020-03-1522:20:52
lists.debian.org
96

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

Low

0.024 Low

EPSS

Percentile

90.0%


Debian Security Advisory DSA-4640-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
March 15, 2020 https://www.debian.org/security/faq


Package : graphicsmagick
CVE ID : CVE-2019-19950 CVE-2019-19951 CVE-2019-19953 CVE-2019-11474
CVE-2019-11473 CVE-2019-11506 CVE-2019-11505 CVE-2019-11010
CVE-2019-11009 CVE-2019-11008 CVE-2019-11007 CVE-2019-11006
CVE-2019-11005 CVE-2018-20189 CVE-2018-20185 CVE-2018-20184

This update fixes several vulnerabilities in Graphicsmagick: Various memory
handling problems and cases of missing or incomplete input sanitising
may result in denial of service, memory disclosure or the execution
of arbitrary code if malformed media files are processed.

For the oldstable distribution (stretch), these problems have been fixed
in version 1.3.30+hg15796-1~deb9u3.

For the stable distribution (buster), these problems have been fixed in
version 1.4~hg15978-1+deb10u1.

We recommend that you upgrade your graphicsmagick packages.

For the detailed security status of graphicsmagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/graphicsmagick

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

Low

0.024 Low

EPSS

Percentile

90.0%