Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-29599: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2020-29599: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
12/07/2020
Created
01/20/2021
Added
01/19/2021
Modified
10/22/2021

Description

ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.

Solution(s)

  • suse-upgrade-imagemagick
  • suse-upgrade-imagemagick-config-7-suse
  • suse-upgrade-imagemagick-config-7-upstream
  • suse-upgrade-imagemagick-devel
  • suse-upgrade-imagemagick-devel-32bit
  • suse-upgrade-imagemagick-doc
  • suse-upgrade-imagemagick-extra
  • suse-upgrade-libmagick-7_q16hdri4
  • suse-upgrade-libmagick-7_q16hdri4-32bit
  • suse-upgrade-libmagick-devel
  • suse-upgrade-libmagick-devel-32bit
  • suse-upgrade-libmagickcore-7_q16hdri6
  • suse-upgrade-libmagickcore-7_q16hdri6-32bit
  • suse-upgrade-libmagickwand-7_q16hdri6
  • suse-upgrade-libmagickwand-7_q16hdri6-32bit
  • suse-upgrade-perl-perlmagick

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;