From owner-svn-ports-all@freebsd.org Fri May 6 15:27:50 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CAF29B2E055; Fri, 6 May 2016 15:27:50 +0000 (UTC) (envelope-from kwm@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8E24B1F17; Fri, 6 May 2016 15:27:50 +0000 (UTC) (envelope-from kwm@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u46FRntq004854; Fri, 6 May 2016 15:27:49 GMT (envelope-from kwm@FreeBSD.org) Received: (from kwm@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u46FRns3004853; Fri, 6 May 2016 15:27:49 GMT (envelope-from kwm@FreeBSD.org) Message-Id: <201605061527.u46FRns3004853@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: kwm set sender to kwm@FreeBSD.org using -f From: Koop Mast Date: Fri, 6 May 2016 15:27:49 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r414710 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 06 May 2016 15:27:50 -0000 Author: kwm Date: Fri May 6 15:27:49 2016 New Revision: 414710 URL: https://svnweb.freebsd.org/changeset/ports/414710 Log: Document ImageMagick vulnabilities. PR: 209241 Submitted by: Ben Woods Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri May 6 15:02:46 2016 (r414709) +++ head/security/vuxml/vuln.xml Fri May 6 15:27:49 2016 (r414710) @@ -58,6 +58,59 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + ImageMagick -- multiple vulnerabilities + + + ImageMagick + ImageMagick-nox11 + 6.9.3.9_1 + + + ImageMagick7 + ImageMagick7-nox11 + 7.0.0.0.b201507157.0.1.0_1 + + + + +

Openwall reports:

+
+

Insufficient filtering for filename passed to delegate's command + allows remote code execution during conversion of several file + formats. Any service which uses ImageMagick to process user + supplied images and uses default delegates.xml / policy.xml, + may be vulnerable to this issue.

+

It is possible to make ImageMagick perform a HTTP GET or FTP + request

+

It is possible to delete files by using ImageMagick's 'ephemeral' + pseudo protocol which deletes files after reading.

+

It is possible to move image files to file with any extension + in any folder by using ImageMagick's 'msl' pseudo protocol. + msl.txt and image.gif should exist in known location - /tmp/ + for PoC (in real life it may be web service written in PHP, + which allows to upload raw txt files and process images with + ImageMagick).

+

It is possible to get content of the files from the server + by using ImageMagick's 'label' pseudo protocol.

+
+ +
+ + CVE-2016-3714 + CVE-2016-3715 + CVE-2016-3716 + CVE-2016-3717 + CVE-2016-3718 + http://www.openwall.com/lists/oss-security/2016/05/03/18 + https://imagetragick.com/ + + + 2016-05-03 + 2016-05-06 + +
+ jansson -- local denial of service vulnerabilities