Bugzilla – Bug 1000691
VUL-0: CVE-2015-8958: ImageMagick: Potential DOS in sun file handling due to malformed files
Last modified: 2016-12-22 12:16:21 UTC
References: https://bugs.debian.org/832465 http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26857 https://github.com/ImageMagick/ImageMagick/commit/b8f17d08b7418204bf8a05a5c24e87b2fc395b75 https://github.com/ImageMagick/ImageMagick/commit/1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f https://github.com/ImageMagick/ImageMagick/commit/6b4aff0f117b978502ee5bcd6e753c17aec5a961 https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105
bugbot adjusting priority
Created attachment 695457 [details] testcase Downloaded from the dropbox (upstream bug).
Similarly to bug 1000690. 13.2/ImageMagick $ convert 4a1d6a6d bleble.jpg Aborted (core dumped) $ 12/ImageMagick $ convert 4a1d6a6d test.bmp Aborted (core dumped) $ 11/ImageMagick $ convert 4a1d6a6d bleble.png $ --------- 42.1/GraphicsMagick $ gm convert 4a1d6a6d bleble.png gm convert: Improper image header (4a1d6a6d). $ 13.2/GraphicsMagick $ gm convert 4a1d6a6d bleble.png Segmentation fault (core dumped) $ 42.1/GraphicsMagick $ gm convert 4a1d6a6d bleble.png Segmentation fault (core dumped) $
GraphicsMagick: after applying patch mentioned in bug 1000691 comment 6, the segfault went away: $ gm convert 4a1d6a6d test.bmp gm convert: Improper image header (4a1d6a6d). $
ImageMagick-6 commits: (In reply to Johannes Segitz from comment #0) > https://github.com/ImageMagick/ImageMagick/commit/ > b8f17d08b7418204bf8a05a5c24e87b2fc395b75 https://github.com/ImageMagick/ImageMagick/commit/a09637681647e141a130b8a4e24100ebe81646ab https://github.com/ImageMagick/ImageMagick/commit/2f0df11a4e10bac54bbf615d71bc281c956b1622 BUG http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26857 > https://github.com/ImageMagick/ImageMagick/commit/ > 1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f https://github.com/ImageMagick/ImageMagick/commit/0ac61f79fd3aab16a42d83c0c0bbc1c0e2be0765 BUG http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26867 > https://github.com/ImageMagick/ImageMagick/commit/ > 6b4aff0f117b978502ee5bcd6e753c17aec5a961 https://github.com/ImageMagick/ImageMagick/commit/ca93881b1fe8774b9f6b1f87e328846a3e9ff4df https://github.com/ImageMagick/ImageMagick/commit/9951b3d0824219cd8d331d8560e0b2ea29bc8fe9 > https://github.com/ImageMagick/ImageMagick/commit/ > 8ea44b48a182dd46d018f4b4f09a5e2ee9638105 https://github.com/ImageMagick/ImageMagick/commit/92ef97bd535c2a334b7b95035e23c49c80594327
13.2/ImageMagick and 12/ImageMagick does not crash after patching.
Created attachment 695596 [details] patch against 13.2 and 12
Created attachment 695597 [details] patch against 11
Considering affected all versions of ImageMagick, 13.2/GraphicsMagick and 11/GraphicsMagick.
Created attachment 695598 [details] patch against 13.2 and 12
Created attachment 695599 [details] patch against 11
Created attachment 695600 [details] patch against 13.2 and 12
Nice one.
I believe all fixed.
This is an autogenerated message for OBS integration: This bug (1000691) was mentioned in https://build.opensuse.org/request/show/434745 13.2 / GraphicsMagick https://build.opensuse.org/request/show/434746 13.2 / ImageMagick
This is an autogenerated message for OBS integration: This bug (1000691) was mentioned in https://build.opensuse.org/request/show/435916 13.2 / GraphicsMagick https://build.opensuse.org/request/show/435917 13.2 / ImageMagick
openSUSE-SU-2016:2641-1: An update that fixes 28 vulnerabilities is now available. Category: security (moderate) Bug References: 1000399,1000434,1000436,1000689,1000690,1000691,1000692,1000693,1000695,1000698,1000700,1000702,1000704,1000707,1000711,1001066,1001221,1002206,1002209,1002422,1003629,1005123,1005125,1005127,985442,999673 CVE References: CVE-2015-8957,CVE-2015-8958,CVE-2016-5688,CVE-2016-6823,CVE-2016-7101,CVE-2016-7446,CVE-2016-7447,CVE-2016-7448,CVE-2016-7449,CVE-2016-7515,CVE-2016-7516,CVE-2016-7517,CVE-2016-7519,CVE-2016-7522,CVE-2016-7524,CVE-2016-7526,CVE-2016-7527,CVE-2016-7528,CVE-2016-7529,CVE-2016-7531,CVE-2016-7533,CVE-2016-7537,CVE-2016-7800,CVE-2016-7996,CVE-2016-7997,CVE-2016-8682,CVE-2016-8683,CVE-2016-8684 Sources used: openSUSE 13.2 (src): GraphicsMagick-1.3.20-12.1
SUSE-SU-2016:2667-1: An update that solves 41 vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1000394,1000399,1000434,1000436,1000686,1000688,1000689,1000690,1000691,1000692,1000693,1000694,1000695,1000696,1000697,1000698,1000699,1000700,1000701,1000702,1000703,1000704,1000706,1000707,1000708,1000709,1000711,1000712,1000713,1000714,1000715,1001066,1001221,1002206,1002209,1002421,1002422,1003629,1005123,1005125,1005127,1005328 CVE References: CVE-2014-9907,CVE-2015-8957,CVE-2015-8958,CVE-2015-8959,CVE-2016-6823,CVE-2016-7101,CVE-2016-7513,CVE-2016-7514,CVE-2016-7515,CVE-2016-7516,CVE-2016-7517,CVE-2016-7518,CVE-2016-7519,CVE-2016-7520,CVE-2016-7521,CVE-2016-7522,CVE-2016-7523,CVE-2016-7524,CVE-2016-7525,CVE-2016-7526,CVE-2016-7527,CVE-2016-7528,CVE-2016-7529,CVE-2016-7530,CVE-2016-7531,CVE-2016-7532,CVE-2016-7533,CVE-2016-7534,CVE-2016-7535,CVE-2016-7537,CVE-2016-7538,CVE-2016-7539,CVE-2016-7540,CVE-2016-7799,CVE-2016-7800,CVE-2016-7996,CVE-2016-7997,CVE-2016-8677,CVE-2016-8682,CVE-2016-8683,CVE-2016-8684 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP1 (src): ImageMagick-6.8.8.1-40.1 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): ImageMagick-6.8.8.1-40.1 SUSE Linux Enterprise Server 12-SP1 (src): ImageMagick-6.8.8.1-40.1 SUSE Linux Enterprise Desktop 12-SP1 (src): ImageMagick-6.8.8.1-40.1
openSUSE-SU-2016:2671-1: An update that solves 41 vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1000394,1000399,1000434,1000436,1000686,1000688,1000689,1000690,1000691,1000692,1000693,1000694,1000695,1000696,1000697,1000698,1000699,1000700,1000701,1000703,1000704,1000706,1000707,1000708,1000709,1000710,1000711,1000712,1000713,1000714,1000715,1001066,1001221,1002206,1002209,1002421,1002422,1003629,1005123,1005125,1005127,1005328 CVE References: CVE-2014-9907,CVE-2015-8957,CVE-2015-8958,CVE-2015-8959,CVE-2016-6823,CVE-2016-7101,CVE-2016-7513,CVE-2016-7514,CVE-2016-7515,CVE-2016-7516,CVE-2016-7517,CVE-2016-7518,CVE-2016-7519,CVE-2016-7520,CVE-2016-7521,CVE-2016-7522,CVE-2016-7523,CVE-2016-7524,CVE-2016-7525,CVE-2016-7527,CVE-2016-7528,CVE-2016-7529,CVE-2016-7530,CVE-2016-7531,CVE-2016-7532,CVE-2016-7533,CVE-2016-7534,CVE-2016-7535,CVE-2016-7536,CVE-2016-7537,CVE-2016-7538,CVE-2016-7539,CVE-2016-7540,CVE-2016-7799,CVE-2016-7800,CVE-2016-7996,CVE-2016-7997,CVE-2016-8677,CVE-2016-8682,CVE-2016-8683,CVE-2016-8684 Sources used: openSUSE 13.2 (src): ImageMagick-6.8.9.8-34.1
after updating all packages to 6.4.3.6-7.53.2 from http://download.suse.de/ibs/SUSE:/Maintenance:/3354/, this issue was NOT fixed, and I got a Segmentation fault. The testfile is from comment#2.
SUSE-SU-2016:2724-1: An update that fixes 26 vulnerabilities is now available. Category: security (moderate) Bug References: 1000399,1000434,1000436,1000689,1000690,1000691,1000692,1000693,1000695,1000698,1000700,1000704,1000707,1000711,1001066,1001221,1002206,1002209,1002422,1003629,1005123,1005125,1005127,999673 CVE References: CVE-2015-8957,CVE-2015-8958,CVE-2016-6823,CVE-2016-7101,CVE-2016-7446,CVE-2016-7447,CVE-2016-7448,CVE-2016-7449,CVE-2016-7515,CVE-2016-7516,CVE-2016-7517,CVE-2016-7519,CVE-2016-7522,CVE-2016-7524,CVE-2016-7527,CVE-2016-7528,CVE-2016-7529,CVE-2016-7531,CVE-2016-7533,CVE-2016-7537,CVE-2016-7800,CVE-2016-7996,CVE-2016-7997,CVE-2016-8682,CVE-2016-8683,CVE-2016-8684 Sources used: SUSE Studio Onsite 1.3 (src): GraphicsMagick-1.2.5-4.46.1 SUSE Linux Enterprise Software Development Kit 11-SP4 (src): GraphicsMagick-1.2.5-4.46.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): GraphicsMagick-1.2.5-4.46.1
openSUSE-SU-2016:2770-1: An update that solves 41 vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 1000394,1000399,1000434,1000436,1000686,1000688,1000689,1000690,1000691,1000692,1000693,1000694,1000695,1000696,1000697,1000698,1000699,1000700,1000701,1000702,1000703,1000704,1000706,1000707,1000708,1000709,1000711,1000712,1000713,1000714,1000715,1001066,1001221,1002206,1002209,1002421,1002422,1003629,1005123,1005125,1005127,1005328 CVE References: CVE-2014-9907,CVE-2015-8957,CVE-2015-8958,CVE-2015-8959,CVE-2016-6823,CVE-2016-7101,CVE-2016-7513,CVE-2016-7514,CVE-2016-7515,CVE-2016-7516,CVE-2016-7517,CVE-2016-7518,CVE-2016-7519,CVE-2016-7520,CVE-2016-7521,CVE-2016-7522,CVE-2016-7523,CVE-2016-7524,CVE-2016-7525,CVE-2016-7526,CVE-2016-7527,CVE-2016-7528,CVE-2016-7529,CVE-2016-7530,CVE-2016-7531,CVE-2016-7532,CVE-2016-7533,CVE-2016-7534,CVE-2016-7535,CVE-2016-7537,CVE-2016-7538,CVE-2016-7539,CVE-2016-7540,CVE-2016-7799,CVE-2016-7800,CVE-2016-7996,CVE-2016-7997,CVE-2016-8677,CVE-2016-8682,CVE-2016-8683,CVE-2016-8684 Sources used: openSUSE Leap 42.1 (src): ImageMagick-6.8.8.1-21.1
see comment #c22
See comment #3
Was too quick.
(In reply to Petr Gajdos from comment #27) > See comment #3 Yes, run the command on SLE11SP4 after updating all packages: $ convert 4a1d6a6d bleble.png Segmentation fault Please check it.
I cannot reproduce the segfault. Could you please give me access to the machine where you are experiencing it?
(In reply to Petr Gajdos from comment #30) > I cannot reproduce the segfault. Could you please give me access to the > machine where you are experiencing it? Host:147.2.215.179 user: root pw: novell thank you:)
Backtrace on 147.2.215.179: #0 ReadSUNImage (image_info=0xa53160, exception=0x603080) at coders/sun.c:459 #1 0x00007ffff7a1ed68 in ReadImage (image_info=0xa4efc0, exception=0x603080) at magick/constitute.c:441 #2 0x00007ffff76eeb83 in ConvertImageCommand (image_info=0xa4efc0, argc=3, argv=0x605e40, metadata=0x0, exception=0x603080) at wand/convert.c:560 #3 0x0000000000400f74 in main (argc=3, argv=0x7fffffffe398) at utilities/convert.c:122
(gdb) p sun_info $36 = {magic = 1504078485, width = 32, height = 57305, depth = 1, length = 3072, type = 3, maptype = 0, maplength = 0} (gdb) There is a check in ReadSUNImage(), which is comparing width,height,depth tripple against length. The latest form of this check looks like: if ((sun_info.type != RT_ENCODED) && ((number_pixels*sun_info.depth) > (8UL*sun_info.length))) ThrowReaderException(CorruptImageError,"ImproperImageHeader"); where number_pixels is result of width and height. You can see that the values above does fit the condition (type is RT_FORMAT_RGB). We have this check already in sle12 and 13.2, but in 11, there is an older check. Updating to newest one fixes the segfault for me (see 147.2.215.179).
See sr#123961.
SUSE-SU-2016:2964-1: An update that fixes 34 vulnerabilities is now available. Category: security (important) Bug References: 1000399,1000434,1000436,1000688,1000689,1000690,1000691,1000692,1000693,1000694,1000695,1000698,1000699,1000700,1000701,1000703,1000704,1000707,1000709,1000711,1000713,1000714,1001066,1001221,1002209,1002421,1002422,1003629,1005123,1005125,1005127,1007245 CVE References: CVE-2014-9907,CVE-2015-8957,CVE-2015-8958,CVE-2015-8959,CVE-2016-5687,CVE-2016-6823,CVE-2016-7101,CVE-2016-7514,CVE-2016-7515,CVE-2016-7516,CVE-2016-7517,CVE-2016-7518,CVE-2016-7519,CVE-2016-7522,CVE-2016-7523,CVE-2016-7524,CVE-2016-7525,CVE-2016-7526,CVE-2016-7527,CVE-2016-7528,CVE-2016-7529,CVE-2016-7530,CVE-2016-7531,CVE-2016-7533,CVE-2016-7535,CVE-2016-7537,CVE-2016-7799,CVE-2016-7800,CVE-2016-7996,CVE-2016-7997,CVE-2016-8682,CVE-2016-8683,CVE-2016-8684,CVE-2016-8862 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): ImageMagick-6.4.3.6-7.54.1 SUSE Linux Enterprise Server 11-SP4 (src): ImageMagick-6.4.3.6-7.54.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ImageMagick-6.4.3.6-7.54.1
released. needinfo provided