The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them. |
|
 |
|
|
ImageMagick: out-of-bounds memory reading via ReadTIFFImage
Synthesis of the vulnerability
An attacker can force a read at an invalid address via ReadTIFFImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information. Severity of this computer vulnerability: 2/4.
Creation date: 11/05/2018.
Références of this announce: CVE-2018-8960, openSUSE-SU-2018:1205-1, USN-3681-1, VIGILANCE-VUL-26110.
Full Vigil@nce bulletin... (Free trial)
Description of the vulnerability
An attacker can force a read at an invalid address via ReadTIFFImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information. Full Vigil@nce bulletin... (Free trial)
This security alert impacts software or systems such as openSUSE Leap, Ubuntu.
Our Vigil@nce team determined that the severity of this security weakness is medium.
The trust level is of type confirmed by the editor, with an origin of document.
An attacker with a expert ability can exploit this security announce.
Solutions for this threat
openSUSE Leap 42.3: new ImageMagick packages (11/05/2018).
New packages are available:
openSUSE Leap 42.3: ImageMagick 6.8.8.1-61.2
Ubuntu: new imagemagick packages.
New packages are available:
Ubuntu 18.04 LTS: imagemagick 8:6.9.7.4+dfsg-16ubuntu6.2
Ubuntu 17.10: imagemagick 8:6.9.7.4+dfsg-16ubuntu2.2
Ubuntu 16.04 LTS: imagemagick 8:6.8.9.9-7ubuntu5.11
Ubuntu 14.04 LTS: imagemagick 8:6.7.7.10-6ubuntu3.11
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides computer security patches. The technology watch team tracks security threats targeting the computer system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce vulnerability database contains several thousand vulnerabilities.
|