Univention Bugzilla – Bug 37077
imagemagick: Multiple issues (4.0)
Last modified: 2016-05-27 12:52:07 CEST
Denial of service through out of bound reads in the parsers for PCX, DCM (CVE-2014-8354, CVE-2014-8355 CVE-2014-8362) Out of bounds memory access in JPEG parsing (CVE-2014-8716)
Buffer overflow in DCM parser (CVE-2014-8562, minor)
All of the issues above have been classified as "Minor issue" in Debian. CVE-2014-8362 looks like a typo, probably is CVE-2014-8562
The issue classified as minor issues. Removing target milestone.
Upstream Debian package version 8:6.7.7.10-5+deb7u4 fixes several issues without CVE. The DSA says: "This update fixes a large number of potential security problems such as null-pointer access and buffer-overflows that might lead to memory leaks or denial of service."
Upstream Debian package version 8:6.7.7.10-5+deb7u5 fixes several issues: Several vulnerabilities in ImageMagick, a program suite for image manipulation. These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input. An attacker with control on the image input could, with the privileges of the user running the application, execute code (CVE-2016-3714), make HTTP GET or FTP requests (CVE-2016-3718), or delete (CVE-2016-3715), move (CVE-2016-3716), or read (CVE-2016-3717) local files.
DLA version imported and built in errata4.0-5. Advisory: imagemagick.yaml
OK: DEBIAN_FRONTEND=noninteractive apt-get install --reinstall imagemagick imagemagick-common OK: manual functional test: # convert /var/www/icon/ox.png /tmp/ox.jpg # file /var/www/icon/ox.png /tmp/ox.jpg /var/www/icon/ox.png: PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced /tmp/ox.jpg: JPEG image data, JFIF standard 1.01 OK: advisory
<http://errata.software-univention.de/ucs/4.0/426.html>