Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2021-20312: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2021-20312: SUSE Linux Security Advisory

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
04/20/2021
Created
04/24/2021
Added
04/21/2021
Modified
10/26/2022

Description

A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.

Solution(s)

  • suse-upgrade-imagemagick
  • suse-upgrade-imagemagick-config-6-suse
  • suse-upgrade-imagemagick-config-6-upstream
  • suse-upgrade-imagemagick-config-7-suse
  • suse-upgrade-imagemagick-config-7-upstream
  • suse-upgrade-imagemagick-devel
  • suse-upgrade-imagemagick-devel-32bit
  • suse-upgrade-imagemagick-doc
  • suse-upgrade-imagemagick-extra
  • suse-upgrade-libmagick-6_q16-3
  • suse-upgrade-libmagick-7_q16hdri4
  • suse-upgrade-libmagick-7_q16hdri4-32bit
  • suse-upgrade-libmagick-7_q16hdri5
  • suse-upgrade-libmagick-devel
  • suse-upgrade-libmagick-devel-32bit
  • suse-upgrade-libmagickcore-6_q16-1
  • suse-upgrade-libmagickcore-6_q16-1-32bit
  • suse-upgrade-libmagickcore-7_q16hdri10
  • suse-upgrade-libmagickcore-7_q16hdri6
  • suse-upgrade-libmagickcore-7_q16hdri6-32bit
  • suse-upgrade-libmagickwand-6_q16-1
  • suse-upgrade-libmagickwand-7_q16hdri10
  • suse-upgrade-libmagickwand-7_q16hdri6
  • suse-upgrade-libmagickwand-7_q16hdri6-32bit
  • suse-upgrade-perl-perlmagick

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;