Bugzilla – Bug 1036982
VUL-1: CVE-2017-8347: ImageMagick: denial of service (memory leak) via a crafted file (ReadEXRImage func in exr.c)
Last modified: 2020-05-12 18:02:26 UTC
Created attachment 723255 [details] CVE-2017-8347_memory-leak-in-ReadEXRImage-3_testcase Ref: https://nvd.nist.gov/vuln/detail/CVE-2017-8347 =================================================== Description In ImageMagick 7.0.5-5, the ReadEXRImage function in exr.c allows attackers to cause a denial of service (memory leak) via a crafted file. Source: MITRE Last Modified: 04/30/2017 =================================================== Hyperlink [1] https://github.com/ImageMagick/ImageMagick/issues/441 [2] Testcase: https://github.com/bestshow/p0cs/blob/master/memory-leak-in-ReadEXRImage-3.exr [3] https://github.com/ImageMagick/ImageMagick/commit/48291e72d4d484e69acab1a6b7709c3e10cc525e (master) [4] https://github.com/ImageMagick/ImageMagick/commit/babb3b6c992bef4098ba40353c16d3beba5920a4 (Image-Magick-6) (open-)SUSE: https://software.opensuse.org/package/ImageMagick 7.0.5.4 (TW, official repo) 6.8.8.1 (42.{1,2}, official repo)
GraphicsMagick does not support exr format.
Tested with 12/ImageMagick: BEFORE $ valgrind --leak-check=full identify memory-leak-in-ReadEXRImage-3.exr [..] identify: unable to open image `Cannot read image file "memory-leak-in-ReadEXRImage-3.exr". File is not an image file.': Success @ error/exr.c/ReadEXRImage/194. [..] ==21250== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) $ AFTER $ valgrind --leak-check=full identify memory-leak-in-ReadEXRImage-3.exr [..] ==5146== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) $ I do not get a leak error for 11/ImageMagick and also different message: identify: no decode delegate for this image format `memory-leak-in-ReadEXRImage-3.exr'. It suggests 11/ImageMagick is not affected or the testcase does not exhibit the problem. The code looks it needs the patch, considering affected. Summary: affected are 11/ImageMagick, 12/ImageMagick
I believe all fixed.
SUSE-SU-2017:1489-1: An update that fixes 27 vulnerabilities is now available. Category: security (moderate) Bug References: 1028075,1033091,1034870,1034872,1034876,1036976,1036977,1036978,1036980,1036981,1036982,1036983,1036984,1036985,1036986,1036987,1036988,1036989,1036990,1036991,1037527,1038000,1040025,1040303,1040304,1040306,1040332 CVE References: CVE-2017-6502,CVE-2017-7606,CVE-2017-7941,CVE-2017-7942,CVE-2017-7943,CVE-2017-8343,CVE-2017-8344,CVE-2017-8345,CVE-2017-8346,CVE-2017-8347,CVE-2017-8348,CVE-2017-8349,CVE-2017-8350,CVE-2017-8351,CVE-2017-8352,CVE-2017-8353,CVE-2017-8354,CVE-2017-8355,CVE-2017-8356,CVE-2017-8357,CVE-2017-8765,CVE-2017-8830,CVE-2017-9098,CVE-2017-9141,CVE-2017-9142,CVE-2017-9143,CVE-2017-9144 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Software Development Kit 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Server 12-SP2 (src): ImageMagick-6.8.8.1-70.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ImageMagick-6.8.8.1-70.1
openSUSE-SU-2017:1560-1: An update that fixes 27 vulnerabilities is now available. Category: security (moderate) Bug References: 1028075,1033091,1034870,1034872,1034876,1036976,1036977,1036978,1036980,1036981,1036982,1036983,1036984,1036985,1036986,1036987,1036988,1036989,1036990,1036991,1037527,1038000,1040025,1040303,1040304,1040306,1040332 CVE References: CVE-2017-6502,CVE-2017-7606,CVE-2017-7941,CVE-2017-7942,CVE-2017-7943,CVE-2017-8343,CVE-2017-8344,CVE-2017-8345,CVE-2017-8346,CVE-2017-8347,CVE-2017-8348,CVE-2017-8349,CVE-2017-8350,CVE-2017-8351,CVE-2017-8352,CVE-2017-8353,CVE-2017-8354,CVE-2017-8355,CVE-2017-8356,CVE-2017-8357,CVE-2017-8765,CVE-2017-8830,CVE-2017-9098,CVE-2017-9141,CVE-2017-9142,CVE-2017-9143,CVE-2017-9144 Sources used: openSUSE Leap 42.2 (src): ImageMagick-6.8.8.1-30.3.1
released