|
Lines 58-63
Link Here
|
| 58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
| 59 |
--> |
59 |
--> |
| 60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
61 |
<vuln vid="fcf0125a-1218-11e6-b4a2-bc5ff4fb5ea1"> |
| 62 |
<topic>ImageMagick -- multiple vulnerabilities</topic> |
| 63 |
<affects> |
| 64 |
<package> |
| 65 |
<name>ImageMagick</name> |
| 66 |
<range><lt>6.9.3.9,1</lt></range> |
| 67 |
</package> |
| 68 |
</affects> |
| 69 |
<description> |
| 70 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
| 71 |
<p>Openwall reports:</p> |
| 72 |
<blockquote cite="http://www.openwall.com/lists/oss-security/2016/05/03/18"> |
| 73 |
<p>Insufficient filtering for filename passed to delegate's command allows |
| 74 |
remote code execution during conversion of several file formats. Any |
| 75 |
service which uses ImageMagick to process user supplied images and uses |
| 76 |
default delegates.xml / policy.xml, may be vulnerable to this issue.</p> |
| 77 |
<p>It is possible to make ImageMagick perform a HTTP GET or FTP request</p> |
| 78 |
<p>It is possible to delete files by using ImageMagick's 'ephemeral' pseudo |
| 79 |
protocol which deletes files after reading.</p> |
| 80 |
<p>It is possible to move image files to file with any extension in any |
| 81 |
folder by using ImageMagick's 'msl' pseudo protocol. msl.txt and |
| 82 |
image.gif should exist in known location - /tmp/ for PoC (in real life |
| 83 |
it may be web service written in PHP, which allows to upload raw txt |
| 84 |
files and process images with ImageMagick).</p> |
| 85 |
<p>It is possible to get content of the files from the server by using |
| 86 |
ImageMagick's 'label' pseudo protocol.</p> |
| 87 |
</blockquote> |
| 88 |
</body> |
| 89 |
</description> |
| 90 |
<references> |
| 91 |
<cvename>CVE-2016-3714</cvename> |
| 92 |
<cvename>CVE-2016-3718</cvename> |
| 93 |
<cvename>CVE-2016-3715</cvename> |
| 94 |
<cvename>CVE-2016-3716</cvename> |
| 95 |
<cvename>CVE-2016-3717</cvename> |
| 96 |
<url>http://www.openwall.com/lists/oss-security/2016/05/03/18</url> |
| 97 |
<url>https://imagetragick.com/</url> |
| 98 |
</references> |
| 99 |
<dates> |
| 100 |
<discovery>2016-05-03</discovery> |
| 101 |
<entry>2016-05-04</entry> |
| 102 |
</dates> |
| 103 |
</vuln> |
| 104 |
|
| 61 |
<vuln vid="01d729ca-1143-11e6-b55e-b499baebfeaf"> |
105 |
<vuln vid="01d729ca-1143-11e6-b55e-b499baebfeaf"> |
| 62 |
<topic>LibreSSL -- multiple vulnerabilities</topic> |
106 |
<topic>LibreSSL -- multiple vulnerabilities</topic> |
| 63 |
<affects> |
107 |
<affects> |