Executive Summary

Summary
Titlegraphicsmagick security update
Informations
NameDSA-4640First vendor Publication2020-03-15
VendorDebianLast vendor Modification2020-03-15
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

This update fixes several vulnerabilities in Graphicsmagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or the execution of arbitrary code if malformed media files are processed.

For the oldstable distribution (stretch), these problems have been fixed in version 1.3.30+hg15796-1~deb9u3.

For the stable distribution (buster), these problems have been fixed in version 1.4~hg15978-1+deb10u1.

We recommend that you upgrade your graphicsmagick packages.

For the detailed security status of graphicsmagick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/graphicsmagick

Original Source

Url : http://www.debian.org/security/2020/dsa-4640

CWE : Common Weakness Enumeration

%idName
54 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
23 %CWE-125Out-of-bounds Read
15 %CWE-20Improper Input Validation
8 %CWE-399Resource Management Errors

CPE : Common Platform Enumeration

TypeDescriptionCount
Application67
Os1
Os2

Nessus® Vulnerability Scanner

DateDescription
2018-12-28Name : The remote Debian host is missing a security update.
File : debian_DLA-1619.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2020-03-16 00:17:44
  • First insertion