Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 636178 (CVE-2017-16352, CVE-2017-16353) - <media-gfx/graphicsmagick-1.3.27: specially crafted MIFF files allows a heap overflow or memory information disclosure
Summary: <media-gfx/graphicsmagick-1.3.27: specially crafted MIFF files allows a heap ...
Status: RESOLVED FIXED
Alias: CVE-2017-16352, CVE-2017-16353
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://blogs.securiteam.com/index.ph...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-11-01 18:41 UTC by Aleksandr Wagner (Kivak)
Modified: 2018-03-26 01:46 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aleksandr Wagner (Kivak) 2017-11-01 18:41:40 UTC
CVE-2017-16353 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353):

GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked. 

References:

ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=e4e1c2a581d8
https://blogs.securiteam.com/index.php/archives/3494

CVE-2017-16352 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352):

GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the "Display visual image directory" feature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag. 

References:

ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt
http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=7292230dd185
https://blogs.securiteam.com/index.php/archives/3494
Comment 1 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-03-26 01:29:17 UTC
@maintainer(s), please clean the vulnerable version from the tree.
Comment 2 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-03-26 01:46:01 UTC
cleanup will be tracked in bug #640690

GLSA Vote: No