Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 636178 (CVE-2017-16352, CVE-2017-16353)

Summary: <media-gfx/graphicsmagick-1.3.27: specially crafted MIFF files allows a heap overflow or memory information disclosure
Product: Gentoo Security Reporter: Aleksandr Wagner (Kivak) <alwag>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: graphics+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://blogs.securiteam.com/index.php/archives/3494
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---

Description Aleksandr Wagner (Kivak) 2017-11-01 18:41:40 UTC
CVE-2017-16353 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353):

GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked. 

References:

ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=e4e1c2a581d8
https://blogs.securiteam.com/index.php/archives/3494

CVE-2017-16352 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352):

GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the "Display visual image directory" feature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag. 

References:

ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=7292230dd185
https://blogs.securiteam.com/index.php/archives/3494
Comment 1 Aaron Bauman (RETIRED) gentoo-dev 2018-03-26 01:29:17 UTC
@maintainer(s), please clean the vulnerable version from the tree.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2018-03-26 01:46:01 UTC
cleanup will be tracked in bug #640690

GLSA Vote: No