Bugzilla – Bug 1052711
VUL-1: CVE-2017-12674: ImageMagick: CPU exhaustion in ReadPDBImage in coders/pdb.c, which allows attackers to cause DoS
Last modified: 2019-08-16 15:34:37 UTC
Created attachment 735638 [details] Reproducer CVE-2017-12674 In ImageMagick 7.0.6-2, a CPU exhaustion vulnerability was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service. valgrind convert cpupdb.pdb out.png hangs References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12674 https://github.com/ImageMagick/ImageMagick/issues/604
loop is not endless, can be 2^32-1. system will recover.
Does not hang for me, either. 12/ImageMagick, 11/ImageMagick: $ time convert cpupdb.pdb out.png convert: unexpected end-of-file `cpupdb.pdb': No such file or directory @ error/pdb.c/ReadPDBImage/552. real 0m2.513s user 0m2.503s sys 0m0.000s $ home:pgajdos:magick/ImageMagick: $ time convert cpupdb.pdb out.png convert: unexpected end-of-file `cpupdb.pdb': No such file or directory @ error/pdb.c/ReadPDBImage/559. real 0m0.013s user 0m0.013s sys 0m0.000s $ 11/GraphicsMagick, 42.3/GraphicsMagick and HG/GraphicsMagick $ gm convert cpupdb.pdb out.png gm convert: Corrupt image (cpupdb.pdb). $ [program exits immediately] PATCH Similar to CVE-2015-8902 (bsc#983253), just another occurence of the code. As there, considering affected just 12/ImageMagick and 11/ImageMagick. AFTER 12/ImageMagick $ time convert cpupdb.pdb out.png 052711: unexpected end-of-file `cpupdb.pdb': No such file or directory @ error/pdb.c/ReadPDBImage/552. real 0m0.089s user 0m0.006s sys 0m0.000s $ 11/ImageMagick $ time convert cpupdb.pdb out.png convert: Unexpected end-of-file `cpupdb.pdb': No such file or directory. real 0m0.015s user 0m0.005s sys 0m0.010s $
Will submit for 12/ImageMagick and 11/ImageMagick
Packages submitted.
SUSE-SU-2018:0486-1: An update that fixes 24 vulnerabilities is now available. Category: security (moderate) Bug References: 1042824,1048110,1049374,1049375,1050048,1050617,1050669,1052207,1052248,1052251,1052254,1052472,1052688,1052711,1052747,1052750,1052761,1055069,1055229,1058009,1074119,1076182,1078433 CVE References: CVE-2017-11166,CVE-2017-11448,CVE-2017-11450,CVE-2017-11537,CVE-2017-11637,CVE-2017-11638,CVE-2017-11642,CVE-2017-12418,CVE-2017-12427,CVE-2017-12429,CVE-2017-12432,CVE-2017-12566,CVE-2017-12654,CVE-2017-12664,CVE-2017-12665,CVE-2017-12668,CVE-2017-12674,CVE-2017-13058,CVE-2017-13131,CVE-2017-14224,CVE-2017-17885,CVE-2017-18028,CVE-2017-9407,CVE-2018-6405 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): ImageMagick-6.4.3.6-7.78.34.1 SUSE Linux Enterprise Server 11-SP4 (src): ImageMagick-6.4.3.6-7.78.34.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ImageMagick-6.4.3.6-7.78.34.1
SUSE-SU-2018:0581-1: An update that fixes 35 vulnerabilities is now available. Category: security (moderate) Bug References: 1042824,1042911,1048110,1048272,1049374,1049375,1050048,1050119,1050122,1050126,1050132,1050617,1052207,1052248,1052251,1052254,1052472,1052688,1052711,1052747,1052750,1052754,1052761,1055069,1055229,1056768,1057163,1058009,1072898,1074119,1074170,1075821,1076182,1078433 CVE References: CVE-2017-11166,CVE-2017-11170,CVE-2017-11448,CVE-2017-11450,CVE-2017-11528,CVE-2017-11530,CVE-2017-11531,CVE-2017-11533,CVE-2017-11537,CVE-2017-11638,CVE-2017-11642,CVE-2017-12418,CVE-2017-12427,CVE-2017-12429,CVE-2017-12432,CVE-2017-12566,CVE-2017-12654,CVE-2017-12663,CVE-2017-12664,CVE-2017-12665,CVE-2017-12668,CVE-2017-12674,CVE-2017-13058,CVE-2017-13131,CVE-2017-14060,CVE-2017-14139,CVE-2017-14224,CVE-2017-17682,CVE-2017-17885,CVE-2017-17934,CVE-2017-18028,CVE-2017-9405,CVE-2017-9407,CVE-2018-5357,CVE-2018-6405 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Workstation Extension 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Server 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Server 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Desktop 12-SP3 (src): ImageMagick-6.8.8.1-71.42.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ImageMagick-6.8.8.1-71.42.1
Releasing for Leap, showing as done otherwise
openSUSE-SU-2018:0621-1: An update that fixes 35 vulnerabilities is now available. Category: security (moderate) Bug References: 1042824,1042911,1048110,1048272,1049374,1049375,1050048,1050119,1050122,1050126,1050132,1050617,1052207,1052248,1052251,1052254,1052472,1052688,1052711,1052747,1052750,1052754,1052761,1055069,1055229,1056768,1057163,1058009,1072898,1074119,1074170,1075821,1076182,1078433 CVE References: CVE-2017-11166,CVE-2017-11170,CVE-2017-11448,CVE-2017-11450,CVE-2017-11528,CVE-2017-11530,CVE-2017-11531,CVE-2017-11533,CVE-2017-11537,CVE-2017-11638,CVE-2017-11642,CVE-2017-12418,CVE-2017-12427,CVE-2017-12429,CVE-2017-12432,CVE-2017-12566,CVE-2017-12654,CVE-2017-12663,CVE-2017-12664,CVE-2017-12665,CVE-2017-12668,CVE-2017-12674,CVE-2017-13058,CVE-2017-13131,CVE-2017-14060,CVE-2017-14139,CVE-2017-14224,CVE-2017-17682,CVE-2017-17885,CVE-2017-17934,CVE-2017-18028,CVE-2017-9405,CVE-2017-9407,CVE-2018-5357,CVE-2018-6405 Sources used: openSUSE Leap 42.3 (src): ImageMagick-6.8.8.1-55.1