Executive Summary

Titlegraphicsmagick security update
NameDSA-4640First vendor Publication2020-03-15
VendorDebianLast vendor Modification2020-03-15
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


This update fixes several vulnerabilities in Graphicsmagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service, memory disclosure or the execution of arbitrary code if malformed media files are processed.

For the oldstable distribution (stretch), these problems have been fixed in version 1.3.30+hg15796-1~deb9u3.

For the stable distribution (buster), these problems have been fixed in version 1.4~hg15978-1+deb10u1.

We recommend that you upgrade your graphicsmagick packages.

For the detailed security status of graphicsmagick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/graphicsmagick

Original Source

Url : http://www.debian.org/security/2020/dsa-4640

CWE : Common Weakness Enumeration

54 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
23 %CWE-125Out-of-bounds Read
15 %CWE-20Improper Input Validation
8 %CWE-399Resource Management Errors

CPE : Common Platform Enumeration


Nessus® Vulnerability Scanner

2018-12-28Name : The remote Debian host is missing a security update.
File : debian_DLA-1619.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2020-03-16 00:17:44
  • First insertion