Bugzilla – Bug 983253
VUL-1: CVE-2015-8902: ImageMagick: PDB file DoS (CPU consumption)
Last modified: 2019-10-23 14:39:37 UTC
CVE-2015-8902 1/25/2015 c8ad6aba PDB file DoS, CPU http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26932 https://bugzilla.redhat.com/show_bug.cgi?id=1195269 http://trac.imagemagick.org/changeset/17855 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8902 http://seclists.org/oss-sec/2016/q2/481 (trac currently not up)
Created attachment 679673 [details] CVE-2015-8902.pdb QA REPRODUCER: identify CVE-2015-8902.pdb gm identify CVE-2015-8902.pdb
graphicsmagic does not hang: $ gm identify CVE-2015-8902.pdb CVE-2015-8902.pdb PDB 32x54+0+0 PseudoClass 4c 8-bit 409 0.000u 0:01 $
from bugreport: --- I did run it through valgrind --tool=callgrind for about 20-30 seconds or so. When I pulled it into kcachegrind it apparently spent 1.3B calls in ReadBlobByte. It looks like the loop is on line 372 of coders/pdb.c while reading the pad. ---
bugbot adjusting priority
The www.imagemagick.org says: The authoritative ImageMagick web site is http://www.imagemagick.org. The authoritative source code repository is http://git.imagemagick.org/repos/ImageMagick. We maintain a source code mirror at GitLab and GitHub. So it seems that trac links are now useless.
(In reply to Marcus Meissner from comment #1) > QA REPRODUCER: > > identify CVE-2015-8902.pdb (In reply to Marcus Meissner from comment #2) > graphicsmagic does not hang: > > $ gm identify CVE-2015-8902.pdb > CVE-2015-8902.pdb PDB 32x54+0+0 PseudoClass 4c 8-bit 409 0.000u 0:01 > $ Both are true for all versions we maintain.
https://subversion.imagemagick.org is also down in case someone have the idea that the number of the changeset from the trac link would correspond to some svn commit number. Unfortunately, I have no offline checkout of ImageMagick from the past.
And no, http://git.imagemagick.org/repos/ImageMagick/commits/master?utf8=%E2%9C%93&search=26932 does not work also.
The backtrace of the hung #0 0x00007ffff79811cf in ReadBlobByte (image=image@entry=0x61dc10) at magick/blob.c:3017 #1 0x00007ffff3e5c888 in ReadPDBImage (image_info=0x60e190, exception=0x6053f0) at coders/pdb.c:373 #2 0x00007ffff79b6fb8 in ReadImage (image_info=image_info@entry=0x6097e0, exception=exception@entry=0x6053f0) at magick/constitute.c:547 #3 0x00007ffff79b808b in ReadImages (image_info=image_info@entry=0x6097e0, exception=exception@entry=0x6053f0) at magick/constitute.c:853 #4 0x00007ffff764ffa1 in ConvertImageCommand (image_info=0x6097e0, argc=3, argv=0x6042b0, metadata=0x0, exception=0x6053f0) at wand/convert.c:619 #5 0x00007ffff76bc773 in MagickCommandGenesis (image_info=image_info@entry=0x605630, command=0x4008b0 <ConvertImageCommand@plt>, argc=argc@entry=3, argv=argv@entry=0x7fffffffe7c8, metadata=metadata@entry=0x0, exception=exception@entry=0x6053f0) at wand/mogrify.c:168 #6 0x0000000000400927 in ConvertMain (argv=0x7fffffffe7c8, argc=3) at utilities/convert.c:81 #7 main (argc=3, argv=0x7fffffffe7c8) at utilities/convert.c:92 and the date of the comment http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26932#p119111 points to https://github.com/ImageMagick/ImageMagick/commit/89f839d02a8f261c94f7f7075c3cf90724802958
GraphicsMagick does not have while (num_pad_bytes--) ReadBlobByte( image ); code, considering it not vulnerable.
AFTER $ identify CVE-2015-8902.pdb identify: Memory allocation failed `CVE-2015-8902.pdb'. $ (returns immediately)
I believe all fixed.
This is an autogenerated message for OBS integration: This bug (983253) was mentioned in https://build.opensuse.org/request/show/404239 13.2 / ImageMagick
This is an autogenerated message for OBS integration: This bug (983253) was mentioned in https://build.opensuse.org/request/show/405459 13.2 / ImageMagick
openSUSE-SU-2016:1748-1: An update that fixes 68 vulnerabilities is now available. Category: security (important) Bug References: 983232,983234,983253,983259,983292,983305,983308,983521,983523,983527,983533,983739,983746,983752,983774,983794,983796,983799,983803,984014,984018,984023,984028,984032,984035,984135,984137,984142,984144,984145,984149,984150,984160,984166,984172,984179,984181,984183,984184,984185,984186,984187,984191,984193,984370,984372,984373,984374,984375,984379,984394,984398,984400,984401,984404,984406,984408,984409,984427,984433,984436,985442,985448,985451,985456,985460,986608,986609 CVE References: CVE-2014-9805,CVE-2014-9806,CVE-2014-9807,CVE-2014-9808,CVE-2014-9809,CVE-2014-9810,CVE-2014-9811,CVE-2014-9812,CVE-2014-9813,CVE-2014-9814,CVE-2014-9815,CVE-2014-9816,CVE-2014-9817,CVE-2014-9818,CVE-2014-9819,CVE-2014-9820,CVE-2014-9821,CVE-2014-9822,CVE-2014-9823,CVE-2014-9824,CVE-2014-9825,CVE-2014-9826,CVE-2014-9828,CVE-2014-9829,CVE-2014-9830,CVE-2014-9831,CVE-2014-9832,CVE-2014-9833,CVE-2014-9834,CVE-2014-9835,CVE-2014-9836,CVE-2014-9837,CVE-2014-9838,CVE-2014-9839,CVE-2014-9840,CVE-2014-9841,CVE-2014-9842,CVE-2014-9843,CVE-2014-9844,CVE-2014-9845,CVE-2014-9846,CVE-2014-9847,CVE-2014-9848,CVE-2014-9849,CVE-2014-9850,CVE-2014-9851,CVE-2014-9852,CVE-2014-9853,CVE-2014-9854,CVE-2015-8894,CVE-2015-8895,CVE-2015-8896,CVE-2015-8897,CVE-2015-8898,CVE-2015-8900,CVE-2015-8901,CVE-2015-8902,CVE-2015-8903,CVE-2016-4562,CVE-2016-4563,CVE-2016-4564,CVE-2016-5687,CVE-2016-5688,CVE-2016-5689,CVE-2016-5690,CVE-2016-5691,CVE-2016-5841,CVE-2016-5842 Sources used: openSUSE 13.2 (src): ImageMagick-6.8.9.8-26.1
SUSE-SU-2016:1782-1: An update that fixes 57 vulnerabilities is now available. Category: security (important) Bug References: 983234,983253,983259,983292,983305,983308,983521,983523,983533,983739,983746,983752,983774,983794,983796,983799,983803,984018,984023,984028,984032,984035,984135,984137,984142,984144,984145,984150,984160,984166,984181,984184,984185,984186,984187,984193,984370,984372,984373,984374,984375,984379,984394,984398,984400,984401,984408,984409,984433,984436,985442,985448,985451,985456,985460,986608,986609 CVE References: CVE-2014-9805,CVE-2014-9806,CVE-2014-9807,CVE-2014-9808,CVE-2014-9809,CVE-2014-9810,CVE-2014-9811,CVE-2014-9812,CVE-2014-9813,CVE-2014-9814,CVE-2014-9815,CVE-2014-9816,CVE-2014-9817,CVE-2014-9818,CVE-2014-9819,CVE-2014-9820,CVE-2014-9822,CVE-2014-9823,CVE-2014-9824,CVE-2014-9826,CVE-2014-9828,CVE-2014-9829,CVE-2014-9830,CVE-2014-9831,CVE-2014-9834,CVE-2014-9835,CVE-2014-9836,CVE-2014-9837,CVE-2014-9838,CVE-2014-9839,CVE-2014-9840,CVE-2014-9842,CVE-2014-9844,CVE-2014-9845,CVE-2014-9846,CVE-2014-9847,CVE-2014-9849,CVE-2014-9851,CVE-2014-9853,CVE-2014-9854,CVE-2015-8894,CVE-2015-8896,CVE-2015-8897,CVE-2015-8898,CVE-2015-8901,CVE-2015-8902,CVE-2015-8903,CVE-2016-4562,CVE-2016-4563,CVE-2016-4564,CVE-2016-5687,CVE-2016-5688,CVE-2016-5689,CVE-2016-5690,CVE-2016-5691,CVE-2016-5841,CVE-2016-5842 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): ImageMagick-6.4.3.6-7.45.1 SUSE Linux Enterprise Server 11-SP4 (src): ImageMagick-6.4.3.6-7.45.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ImageMagick-6.4.3.6-7.45.1
SUSE-SU-2016:1784-1: An update that fixes 68 vulnerabilities is now available. Category: security (important) Bug References: 983232,983234,983253,983259,983292,983305,983308,983521,983523,983527,983533,983739,983746,983752,983774,983794,983796,983799,983803,984014,984018,984023,984028,984032,984035,984135,984137,984142,984144,984145,984149,984150,984160,984166,984172,984179,984181,984183,984184,984185,984186,984187,984191,984193,984370,984372,984373,984374,984375,984379,984394,984398,984400,984401,984404,984406,984408,984409,984427,984433,984436,985442,985448,985451,985456,985460,986608,986609 CVE References: CVE-2014-9805,CVE-2014-9806,CVE-2014-9807,CVE-2014-9808,CVE-2014-9809,CVE-2014-9810,CVE-2014-9811,CVE-2014-9812,CVE-2014-9813,CVE-2014-9814,CVE-2014-9815,CVE-2014-9816,CVE-2014-9817,CVE-2014-9818,CVE-2014-9819,CVE-2014-9820,CVE-2014-9821,CVE-2014-9822,CVE-2014-9823,CVE-2014-9824,CVE-2014-9825,CVE-2014-9826,CVE-2014-9828,CVE-2014-9829,CVE-2014-9830,CVE-2014-9831,CVE-2014-9832,CVE-2014-9833,CVE-2014-9834,CVE-2014-9835,CVE-2014-9836,CVE-2014-9837,CVE-2014-9838,CVE-2014-9839,CVE-2014-9840,CVE-2014-9841,CVE-2014-9842,CVE-2014-9843,CVE-2014-9844,CVE-2014-9845,CVE-2014-9846,CVE-2014-9847,CVE-2014-9848,CVE-2014-9849,CVE-2014-9850,CVE-2014-9851,CVE-2014-9852,CVE-2014-9853,CVE-2014-9854,CVE-2015-8894,CVE-2015-8895,CVE-2015-8896,CVE-2015-8897,CVE-2015-8898,CVE-2015-8900,CVE-2015-8901,CVE-2015-8902,CVE-2015-8903,CVE-2016-4562,CVE-2016-4563,CVE-2016-4564,CVE-2016-5687,CVE-2016-5688,CVE-2016-5689,CVE-2016-5690,CVE-2016-5691,CVE-2016-5841,CVE-2016-5842 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP1 (src): ImageMagick-6.8.8.1-30.2 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): ImageMagick-6.8.8.1-30.2 SUSE Linux Enterprise Server 12-SP1 (src): ImageMagick-6.8.8.1-30.2 SUSE Linux Enterprise Desktop 12-SP1 (src): ImageMagick-6.8.8.1-30.2
openSUSE-SU-2016:1833-1: An update that fixes 68 vulnerabilities is now available. Category: security (important) Bug References: 983232,983234,983253,983259,983292,983305,983308,983521,983523,983527,983533,983739,983746,983752,983774,983794,983796,983799,983803,984014,984018,984023,984028,984032,984035,984135,984137,984142,984144,984145,984149,984150,984160,984166,984172,984179,984181,984183,984184,984185,984186,984187,984191,984193,984370,984372,984373,984374,984375,984379,984394,984398,984400,984401,984404,984406,984408,984409,984427,984433,984436,985442,985448,985451,985456,985460,986608,986609 CVE References: CVE-2014-9805,CVE-2014-9806,CVE-2014-9807,CVE-2014-9808,CVE-2014-9809,CVE-2014-9810,CVE-2014-9811,CVE-2014-9812,CVE-2014-9813,CVE-2014-9814,CVE-2014-9815,CVE-2014-9816,CVE-2014-9817,CVE-2014-9818,CVE-2014-9819,CVE-2014-9820,CVE-2014-9821,CVE-2014-9822,CVE-2014-9823,CVE-2014-9824,CVE-2014-9825,CVE-2014-9826,CVE-2014-9828,CVE-2014-9829,CVE-2014-9830,CVE-2014-9831,CVE-2014-9832,CVE-2014-9833,CVE-2014-9834,CVE-2014-9835,CVE-2014-9836,CVE-2014-9837,CVE-2014-9838,CVE-2014-9839,CVE-2014-9840,CVE-2014-9841,CVE-2014-9842,CVE-2014-9843,CVE-2014-9844,CVE-2014-9845,CVE-2014-9846,CVE-2014-9847,CVE-2014-9848,CVE-2014-9849,CVE-2014-9850,CVE-2014-9851,CVE-2014-9852,CVE-2014-9853,CVE-2014-9854,CVE-2015-8894,CVE-2015-8895,CVE-2015-8896,CVE-2015-8897,CVE-2015-8898,CVE-2015-8900,CVE-2015-8901,CVE-2015-8902,CVE-2015-8903,CVE-2016-4562,CVE-2016-4563,CVE-2016-4564,CVE-2016-5687,CVE-2016-5688,CVE-2016-5689,CVE-2016-5690,CVE-2016-5691,CVE-2016-5841,CVE-2016-5842 Sources used: openSUSE Leap 42.1 (src): ImageMagick-6.8.8.1-15.1