Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0156
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0156)
Zusammenfassung:The remote host is missing an update for the 'abydos, blender, converseen, cuneiform-linux, digikam, imagemagick, kxstitch, libopenshot, mgba, pfstools, php-imagick, pythonmagick, sk1, spectacle, synfig, transcode, uniconvertor, windowmaker, xine-lib1.2, zbar' package(s) announced via the MGASA-2021-0156 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'abydos, blender, converseen, cuneiform-linux, digikam, imagemagick, kxstitch, libopenshot, mgba, pfstools, php-imagick, pythonmagick, sk1, spectacle, synfig, transcode, uniconvertor, windowmaker, xine-lib1.2, zbar' package(s) announced via the MGASA-2021-0156 advisory.

Vulnerability Insight:
A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits
a crafted file that is processed by ImageMagick could trigger undefined
behavior in the form of math division by zero. The highest threat from
this vulnerability is to system availability (CVE-2021-20241).

A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits
a crafted file that is processed by ImageMagick could trigger undefined
behavior in the form of math division by zero. The highest threat from
this vulnerability is to system availability (CVE-2021-20243).

A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who
submits a crafted file that is processed by ImageMagick could trigger undefined
behavior in the form of math division by zero. The highest threat from this
vulnerability is to system availability (CVE-2021-20244).

A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who
submits a crafted file that is processed by ImageMagick could trigger undefined
behavior in the form of math division by zero. The highest threat from this
vulnerability is to system availability (CVe-2021-20246).

Note that abydos, blender, converseen, cuneiform-linux, digikam, kxxstich,
libopenshot, pfstools, php-imagick, spectacle, synfig, xine-lib1.2, mgba,
windowmaker, zbar and transcode (and tainted conter-parts) have been rebuilt.

Affected Software/OS:
'abydos, blender, converseen, cuneiform-linux, digikam, imagemagick, kxstitch, libopenshot, mgba, pfstools, php-imagick, pythonmagick, sk1, spectacle, synfig, transcode, uniconvertor, windowmaker, xine-lib1.2, zbar' package(s) on Mageia 7, Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-20241
https://bugzilla.redhat.com/show_bug.cgi?id=1928952
https://github.com/ImageMagick/ImageMagick/pull/3177
https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-20243
https://bugzilla.redhat.com/show_bug.cgi?id=1928958
https://github.com/ImageMagick/ImageMagick/pull/3193
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-20244
https://bugzilla.redhat.com/show_bug.cgi?id=1928959
https://github.com/ImageMagick/ImageMagick/pull/3194
Common Vulnerability Exposure (CVE) ID: CVE-2021-20246
https://bugzilla.redhat.com/show_bug.cgi?id=1928941
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.