vulnerability

SUSE: CVE-2018-16643: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Sep 6, 2018
Added
Oct 6, 2018
Modified
Feb 4, 2022

Description

The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.

Solutions

suse-upgrade-graphicsmagicksuse-upgrade-imagemagicksuse-upgrade-imagemagick-config-6-susesuse-upgrade-imagemagick-config-6-upstreamsuse-upgrade-imagemagick-config-7-susesuse-upgrade-imagemagick-config-7-upstreamsuse-upgrade-imagemagick-develsuse-upgrade-imagemagick-devel-32bitsuse-upgrade-imagemagick-docsuse-upgrade-imagemagick-extrasuse-upgrade-libgraphicsmagick2suse-upgrade-libmagick-1suse-upgrade-libmagick-6_q16-3suse-upgrade-libmagick-7_q16hdri4suse-upgrade-libmagick-7_q16hdri4-32bitsuse-upgrade-libmagick-develsuse-upgrade-libmagick-devel-32bitsuse-upgrade-libmagickcore-6_q16-1suse-upgrade-libmagickcore-6_q16-1-32bitsuse-upgrade-libmagickcore-7_q16hdri6suse-upgrade-libmagickcore-7_q16hdri6-32bitsuse-upgrade-libmagickcore1suse-upgrade-libmagickcore1-32bitsuse-upgrade-libmagickwand-6_q16-1suse-upgrade-libmagickwand-7_q16hdri6suse-upgrade-libmagickwand-7_q16hdri6-32bitsuse-upgrade-libmagickwand1suse-upgrade-libmagickwand1-32bitsuse-upgrade-perl-graphicsmagicksuse-upgrade-perl-perlmagick
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.