Description Preview
GraphicsMagick 1.3.26 contains a use-after-free vulnerability in the ReadOneJNGImage and ReadJNGImage functions located in coders/png.c. When processing specially crafted JNG image files, the application may attempt to access memory after it has been freed in the CloseBlob function in magick/blob.c. This vulnerability could lead to denial of service conditions or potentially allow for remote code execution. This issue is related to CVE-2017-11403 and has been assigned CWE-416 (Use After Free).
Overview
GraphicsMagick is a robust collection of tools and libraries for reading, writing, and manipulating images in various formats. The vulnerability exists in the JNG (JPEG Network Graphics) image processing functionality. When parsing maliciously crafted JNG files, the application incorrectly manages memory resources, leading to a situation where it attempts to access memory that has already been freed. This use-after-free condition can cause the application to crash, resulting in denial of service. In some cases, attackers may be able to exploit this vulnerability to execute arbitrary code with the privileges of the application processing the image.
Remediation
Users and administrators should take the following actions to mitigate this vulnerability:
- Update GraphicsMagick to a patched version that contains the fix (the patch is available in the referenced commit 98721124e51f).
- If using a package manager, apply security updates from your distribution:
- Debian users should apply DLA 1322-1 (for Debian LTS), DLA 1456-1 (for Debian LTS), or DSA-4321 (for stable Debian)
- Fedora users should apply updates referenced in FEDORA-2019-da4c20882c and FEDORA-2019-425a1aa7c9
- If immediate updating is not possible, implement input validation to ensure only trusted JNG images are processed by the application.
- Consider using application sandboxing or containerization to limit the impact of potential exploits.
References
- Patch: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/98721124e51f
- Bug Report: https://sourceforge.net/p/graphicsmagick/bugs/438/
- SecurityFocus: http://www.securityfocus.com/bid/103276
- Debian Security Advisory: https://www.debian.org/security/2018/dsa-4321
- Debian LTS Announcements:
- https://lists.debian.org/debian-lts-announce/2018/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html
- Fedora Package Announcements:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade