Lucene search

K
nessusThis script is Copyright (C) 2016-2024 and is owned by Tenable, Inc. or an Affiliate thereof.IMAGEMAGICK_7_0_1_10.NASL
HistoryJun 22, 2016 - 12:00 a.m.

ImageMagick 7.x < 7.0.1-10 Multiple Vulnerabilities

2016-06-2200:00:00
This script is Copyright (C) 2016-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
19

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.009

Percentile

82.5%

The remote Windows host has a version of ImageMagick installed that is 7.x prior to 7.0.1-10. It is, therefore, affected by the following vulnerabilities :

  • An overflow condition exists in the ReadRLEImage() function in rle.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted RLE image, to cause a heap-based buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.
    (CVE-2016-10050)

  • An unspecified flaw exists in the ConcatenateImages() function in magick-cli.c that is triggered when handling return values. An unauthenticated, remote attacker can exploit this to have an unspecified impact.
    (CVE-2016-10060)

  • An unspecified flaw exists in the ReadGROUP4Image() function in tiff.c that is triggered when handling return values. An unauthenticated, remote attacker can exploit this to have an unspecified impact.
    (CVE-2016-10061)

  • An unspecified flaw exists in the ReadGROUP4Image() function in tiff.c that is triggered when handling fwrite errors. An unauthenticated, remote attacker can exploit this to have an unspecified impact.
    (CVE-2016-10062)

  • A flaw exists in pes.c due to improper handling of PES blocks. An unauthenticated, remote attacker can exploit this to cause a process linked against the library to crash, resulting in a denial of service condition.

##
# (C) Tenable, Inc.
##

include("compat.inc");

if (description)
{
  script_id(91763);
  script_version("1.11");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/04");

  script_cve_id(
    "CVE-2016-10050",
    "CVE-2016-10060",
    "CVE-2016-10061",
    "CVE-2016-10062"
  );
  script_bugtraq_id(
    95185,
    95207,
    95208,
    95209
  );

  script_name(english:"ImageMagick 7.x < 7.0.1-10 Multiple Vulnerabilities");
  script_summary(english:"Checks the version of ImageMagick.");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an application installed that is affected
by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host has a version of ImageMagick installed that is
7.x prior to 7.0.1-10. It is, therefore, affected by the following
vulnerabilities :

  - An overflow condition exists in the ReadRLEImage()
    function in rle.c due to improper validation of
    user-supplied input. An unauthenticated, remote attacker
    can exploit this, by convincing a user to open a 
    specially crafted RLE image, to cause a heap-based
    buffer overflow, resulting in a denial of service
    condition or the execution of arbitrary code.
    (CVE-2016-10050)

  - An unspecified flaw exists in the ConcatenateImages()
    function in magick-cli.c that is triggered when handling
    return values. An unauthenticated, remote attacker can
    exploit this to have an unspecified impact.
    (CVE-2016-10060)

  - An unspecified flaw exists in the ReadGROUP4Image()
    function in tiff.c that is triggered when handling
    return values. An unauthenticated, remote attacker can
    exploit this to have an unspecified impact.
    (CVE-2016-10061)
    
  - An unspecified flaw exists in the ReadGROUP4Image()
    function in tiff.c that is triggered when handling
    fwrite errors. An unauthenticated, remote attacker can
    exploit this to have an unspecified impact.
    (CVE-2016-10062)

  - A flaw exists in pes.c due to improper handling of PES
    blocks. An unauthenticated, remote attacker can exploit
    this to cause a process linked against the library to
    crash, resulting in a denial of service condition.");
  script_set_attribute(attribute:"see_also", value:"http://www.imagemagick.org/script/changelog.php");
  script_set_attribute(attribute:"see_also", value:"https://github.com/ImageMagick/ImageMagick/issues/213");
  script_set_attribute(attribute:"solution", value:
"Upgrade to ImageMagick version 7.0.1-10 or later.

Note that you may need to manually uninstall the vulnerable version
from the system.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-10050");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/06/04");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/06/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/06/22");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:imagemagick:imagemagick");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2016-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("imagemagick_installed.nasl");
  script_require_keys("installed_sw/ImageMagick");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::combined_get_app_info(app:"ImageMagick");

var constraints = [
  {'min_version' : '7.0', 'fixed_version' : '7.0.1.10', 'fixed_display' : '7.0.1-10'}
];

vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_WARNING
);

VendorProductVersionCPE
imagemagickimagemagickcpe:/a:imagemagick:imagemagick

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.009

Percentile

82.5%