Lucene search

K
ubuntuUbuntuUSN-5974-1
HistoryMar 27, 2023 - 12:00 a.m.

GraphicsMagick vulnerabilities

2023-03-2700:00:00
ubuntu.com
37
graphicsmagick
ubuntu
image processing
bounds checks
tga
dib
bmp
mng
cve-2018-20184
cve-2018-20189
cve-2018-5685
cve-2018-9018
cve-2019-11006
cve-2020-12672
cve-2022-1270

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.6%

Releases

  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • graphicsmagick - collection of image processing tools

Details

It was discovered that GraphicsMagick was not properly performing bounds
checks when processing TGA image files, which could lead to a heap buffer
overflow. If a user or automated system were tricked into processing a
specially crafted TGA image file, an attacker could possibly use this
issue to cause a denial of service or execute arbitrary code. This issue
only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-20184)

It was discovered that GraphicsMagick was not properly validating bits per
pixel data when processing DIB image files. If a user or automated system
were tricked into processing a specially crafted DIB image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2018-20189)

It was discovered that GraphicsMagick was not properly processing
bit-field mask values in BMP image files, which could result in the
execution of an infinite loop. If a user or automated system were tricked
into processing a specially crafted BMP image file, an attacker could
possibly use this issue to cause a denial of service. This issue only
affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-5685)

It was discovered that GraphicsMagick was not properly validating data
used in arithmetic operations when processing MNG image files, which
could result in a divide-by-zero error. If a user or automated system were
tricked into processing a specially crafted MNG image file, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-9018)

It was discovered that GraphicsMagick was not properly performing bounds
checks when processing MIFF image files, which could lead to a heap buffer
overflow. If a user or automated system were tricked into processing a
specially crafted MIFF image file, an attacker could possibly use this
issue to cause a denial of service or expose sensitive information. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2019-11006)

It was discovered that GraphicsMagick did not properly magnify certain
MNG image files, which could lead to a heap buffer overflow. If a user or
automated system were tricked into processing a specially crafted MNG
image file, an attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu
20.04 LTS. (CVE-2020-12672)

It was discovered that GraphicsMagick was not properly performing bounds
checks when parsing certain MIFF image files, which could lead to a heap
buffer overflow. If a user or automated system were tricked into
processing a specially crafted MIFF image file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-1270)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchlibgraphicsmagick-q16-3< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchgraphicsmagick< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchgraphicsmagick-dbg< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchgraphicsmagick-imagemagick-compat< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchgraphicsmagick-libmagick-dev-compat< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchlibgraphics-magick-perl< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchlibgraphicsmagick++-q16-12< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchlibgraphicsmagick++1-dev< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu20.04noarchlibgraphicsmagick1-dev< 1.4+really1.3.35-1ubuntu0.1UNKNOWN
Ubuntu18.04noarchlibgraphicsmagick-q16-3< 1.3.28-2ubuntu0.2+esm1UNKNOWN
Rows per page:
1-10 of 521

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.6%