Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ImageMagick
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ImageMagick
ID: USN-3681-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.10, Ubuntu 18.04 LTS
Datum: Di, 12. Juni 2018, 14:53
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11655
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11251
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14532
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12435
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17681
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12674
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18211
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
Applikationen: ImageMagick

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============9072712095411478984==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="BheQay7f5QIVguHu6GyqEgUMbNciBktcP"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--BheQay7f5QIVguHu6GyqEgUMbNciBktcP
Content-Type: multipart/mixed;
boundary="KISjqGeuDF41joaHzMHv1WdcTg3RqV4X4";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <f8c917c8-db4d-9168-a23a-6d89700d3382@canonical.com>
Subject: [USN-3681-1] ImageMagick vulnerabilities

--KISjqGeuDF41joaHzMHv1WdcTg3RqV4X4
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3681-1
June 12, 2018

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
imagemagick 8:6.9.7.4+dfsg-16ubuntu6.2
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.2
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.2
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.2
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.2

Ubuntu 17.10:
imagemagick 8:6.9.7.4+dfsg-16ubuntu2.2
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu2.2
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu2.2
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu2.2
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu2.2

Ubuntu 16.04 LTS:
imagemagick 8:6.8.9.9-7ubuntu5.11
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.11
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.11
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.11
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.11

Ubuntu 14.04 LTS:
imagemagick 8:6.7.7.10-6ubuntu3.11
libmagick++5 8:6.7.7.10-6ubuntu3.11
libmagickcore5 8:6.7.7.10-6ubuntu3.11
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.11

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3681-1
CVE-2017-1000445, CVE-2017-1000476, CVE-2017-10995, CVE-2017-11352,
CVE-2017-11533, CVE-2017-11535, CVE-2017-11537, CVE-2017-11639,
CVE-2017-11640, CVE-2017-12140, CVE-2017-12418, CVE-2017-12429,
CVE-2017-12430, CVE-2017-12431, CVE-2017-12432, CVE-2017-12433,
CVE-2017-12435, CVE-2017-12563, CVE-2017-12587, CVE-2017-12640,
CVE-2017-12643, CVE-2017-12644, CVE-2017-12670, CVE-2017-12674,
CVE-2017-12691, CVE-2017-12692, CVE-2017-12693, CVE-2017-12875,
CVE-2017-12877, CVE-2017-12983, CVE-2017-13058, CVE-2017-13059,
CVE-2017-13060, CVE-2017-13061, CVE-2017-13062, CVE-2017-13131,
CVE-2017-13134, CVE-2017-13139, CVE-2017-13142, CVE-2017-13143,
CVE-2017-13144, CVE-2017-13145, CVE-2017-13758, CVE-2017-13768,
CVE-2017-13769, CVE-2017-14060, CVE-2017-14172, CVE-2017-14173,
CVE-2017-14174, CVE-2017-14175, CVE-2017-14224, CVE-2017-14249,
CVE-2017-14325, CVE-2017-14326, CVE-2017-14341, CVE-2017-14342,
CVE-2017-14343, CVE-2017-14400, CVE-2017-14505, CVE-2017-14531,
CVE-2017-14532, CVE-2017-14533, CVE-2017-14607, CVE-2017-14624,
CVE-2017-14625, CVE-2017-14626, CVE-2017-14682, CVE-2017-14684,
CVE-2017-14739, CVE-2017-14741, CVE-2017-14989, CVE-2017-15015,
CVE-2017-15016, CVE-2017-15017, CVE-2017-15032, CVE-2017-15033,
CVE-2017-15217, CVE-2017-15218, CVE-2017-15277, CVE-2017-15281,
CVE-2017-16546, CVE-2017-17499, CVE-2017-17504, CVE-2017-17680,
CVE-2017-17681, CVE-2017-17682, CVE-2017-17879, CVE-2017-17881,
CVE-2017-17882, CVE-2017-17884, CVE-2017-17885, CVE-2017-17886,
CVE-2017-17887, CVE-2017-17914, CVE-2017-17934, CVE-2017-18008,
CVE-2017-18022, CVE-2017-18027, CVE-2017-18028, CVE-2017-18029,
CVE-2017-18209, CVE-2017-18211, CVE-2017-18251, CVE-2017-18252,
CVE-2017-18254, CVE-2017-18271, CVE-2017-18273, CVE-2018-10177,
CVE-2018-10804, CVE-2018-10805, CVE-2018-11251, CVE-2018-11625,
CVE-2018-11655, CVE-2018-11656, CVE-2018-5246, CVE-2018-5247,
CVE-2018-5248, CVE-2018-5357, CVE-2018-5358, CVE-2018-6405,
CVE-2018-7443, CVE-2018-8804, CVE-2018-8960, CVE-2018-9133

Package Information:
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu6.2
https://launchpad.net/ubuntu/+source/imagemagick/8:6.9.7.4+dfsg-16ubuntu2.2
https://launchpad.net/ubuntu/+source/imagemagick/8:6.8.9.9-7ubuntu5.11
https://launchpad.net/ubuntu/+source/imagemagick/8:6.7.7.10-6ubuntu3.11


--KISjqGeuDF41joaHzMHv1WdcTg3RqV4X4--

--BheQay7f5QIVguHu6GyqEgUMbNciBktcP
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=NIit
-----END PGP SIGNATURE-----

--BheQay7f5QIVguHu6GyqEgUMbNciBktcP--


--===============9072712095411478984==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============9072712095411478984==--
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung