View | Details | Raw Unified | Return to bug 209241
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+44 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="fcf0125a-1218-11e6-b4a2-bc5ff4fb5ea1">
62
    <topic>ImageMagick -- multiple vulnerabilities</topic>
63
    <affects>
64
      <package>
65
	<name>ImageMagick</name>
66
	<range><lt>6.9.3.9,1</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Openwall reports:</p>
72
	<blockquote cite="http://www.openwall.com/lists/oss-security/2016/05/03/18">
73
	  <p>Insufficient filtering for filename passed to delegate's command allows
74
	    remote code execution during conversion of several file formats. Any
75
	    service which uses ImageMagick to process user supplied images and uses
76
	    default delegates.xml / policy.xml, may be vulnerable to this issue.</p>
77
	  <p>It is possible to make ImageMagick perform a HTTP GET or FTP request</p>
78
	  <p>It is possible to delete files by using ImageMagick's 'ephemeral' pseudo
79
	    protocol which deletes files after reading.</p>
80
	  <p>It is possible to move image files to file with any extension in any
81
	    folder by using ImageMagick's 'msl' pseudo protocol. msl.txt and
82
	    image.gif should exist in known location - /tmp/ for PoC (in real life
83
	    it may be web service written in PHP, which allows to upload raw txt
84
	    files and process images with ImageMagick).</p>
85
	  <p>It is possible to get content of the files from the server by using
86
	    ImageMagick's 'label' pseudo protocol.</p>
87
	</blockquote>
88
      </body>
89
    </description>
90
    <references>
91
      <cvename>CVE-2016-3714</cvename>
92
      <cvename>CVE-2016-3718</cvename>
93
      <cvename>CVE-2016-3715</cvename>
94
      <cvename>CVE-2016-3716</cvename>
95
      <cvename>CVE-2016-3717</cvename>
96
      <url>http://www.openwall.com/lists/oss-security/2016/05/03/18</url>
97
      <url>https://imagetragick.com/</url>
98
    </references>
99
    <dates>
100
      <discovery>2016-05-03</discovery>
101
      <entry>2016-05-04</entry>
102
    </dates>
103
  </vuln>
104
61
  <vuln vid="01d729ca-1143-11e6-b55e-b499baebfeaf">
105
  <vuln vid="01d729ca-1143-11e6-b55e-b499baebfeaf">
62
    <topic>LibreSSL -- multiple vulnerabilities</topic>
106
    <topic>LibreSSL -- multiple vulnerabilities</topic>
63
    <affects>
107
    <affects>

Return to bug 209241