Lucene search

K
ubuntuUbuntuUSN-5158-1
HistoryNov 29, 2021 - 12:00 a.m.

ImageMagick vulnerabilities

2021-11-2900:00:00
ubuntu.com
59

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

73.4%

Releases

  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • imagemagick - Image manipulation programs and library

Details

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. (CVE-2021-20244)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. (CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service (CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. (CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. (CVE-2021-20313)

OSVersionArchitecturePackageVersionFilename
Ubuntu18.04noarchlibmagick++-6.q16-7< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-6-common< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-6-doc< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-6.q16< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-6.q16-dbgsym< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-6.q16hdri< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-6.q16hdri-dbgsym< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-common< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Ubuntu18.04noarchimagemagick-doc< 8:6.9.7.4+dfsg-16ubuntu6.12UNKNOWN
Rows per page:
1-10 of 981

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

73.4%