ESB-2018.1847 - [Win][Linux][Debian] php-horde-image: Execute arbitrary code/commands - Existing account 2018-06-25

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1847
             Remote code execution patched in php-horde-image
                               25 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           php-horde-image
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Linux variants
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-14650 CVE-2017-9774 

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/06/msg00002.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running php-horde-image check for an updated version of the software
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : php-horde-image
Version        : 2.1.0-4+deb8u1
CVE IDs        : CVE-2017-9774 CVE-2017-14650
Debian Bugs    : #865505 876400

It was discovered that there were two remote code execution
vulnerabilities in php-horde-image, the image processing library for the
Horde <https://www.horde.org/> groupware tool:

 * CVE-2017-9774: A remote code execution vulnerability (RCE) that was
   exploitable by a logged-in user sending a maliciously crafted HTTP GET
   request to various image backends.
   
   Note that the fix applied upstream has a regression in that it ignores
   the "force aspect ratio" option; see <https://github.com/horde/Image/pull/1>.

 * CVE-2017-14650: Another RCE that was exploitable by a logged-in
   user sending a maliciously crafted GET request specifically to the "im"
   image backend.

For Debian 8 "Jessie", these issues have been fixed in php-horde-image
version 2.1.0-4+deb8u1.

We recommend that you upgrade your php-horde-image packages.


Regards,

- - -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAlsszcQACgkQHpU+J9Qx
HljSXA/+JFT5MsPTrxe3hawjb3VrQt43OuDs20YkqEb37rz3OV/UGFiGLiIWKSFc
cSeyNhxRL6FTj7OZzSiQBHMwWzRDpPp9jxJqJEDwnR3M/Il2gsZbRgFAg8xCEDkH
JMIb0ExhwNmMPTnbPkWlWEd5PAn1VdfJAW3IgIHIlr9vgTeDXocSw82GNKQAEFMy
ZEz1Wxdt0/Od43bRJtieNU5fd+JOCDcLTMVgUrozwTMdhZpPC0VEXIjWI4/zah56
LD8GTe1tQ1CST1PE29/GWsU05onARaWRVKzC0fL9YOQnh3SuHKUM9kHA48LlXFBu
ruacoZolYwfwFrkbv1Z89+03wRvTL90QWpHPLfrE/oVQKtG1nSqY7jlrVOO22LGC
YJWtOPnV9l8UEUHrbCKvd5TjFYsK6n1Yl/Dsud9LQhs9yUAveQ/ncGmmvk3TKKvI
9ETujsbNcTPczINqqiZSHBgU5e9mgK0FZq+6fA0CaAwHPeAb2hlLySOql2mMmhaj
+YRgpM/v6t7cgvZdxvgwtU6qPxR7LbkGRGOtuSKBpp0ydDHaqP6UmfbYeYoQnNTs
QzrSDE+IS1K5srytHugVq/ry/xZd223/6gmuyw9MP7yAMRp4pra8hluT8zS930Jv
r7E3mKW9IgA8ZDq5VClAO+5FKiX5ljYlIjGQQm3RpcCuZv3dM/E=
=bdlk
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWzA5OWaOgq3Tt24GAQj3IQ//Q4Co47xHvXK/nIHY9OUQLlWR8w7hGIoj
ydLO6We4A7YGB4SyPd06/Y+Uk3p8De/482HOdaJxi9dcE/4nYR31CSkADgfF5OTM
zkdLJ9ynnIYgtsLKnQyvHTnp9jWv18cshiD9mT9goECHTUXP2Guip55p1Qd6UL2S
IifmyCUF/9Rgd0I3wBiSE2uve4TxtEyvGR+YmTGmUOp9wJYDqUnCkWeMoapZ3E2q
9iBcdHYTIbeUYkkoNJNgl2u1mYn1Sqh1cfpE0WZABkKOEIP2b+dotm43dG+/daLQ
s2SPzpXlhpQFnzhWsRyJvqMe1bhGG67YPVaETEkD2YDGqvShy+e2lSLaPBOwk1PH
5G7MjNCNL5ED27h1eHn3J8QlWrdSlvXdtwVsbxQj0pzTyVlU7UNxJndPpZXWnFDt
RE4dXyAh5A62dQA2wPmpICicLBhAgZfdQYx7R5eto7P9fPIaNsfHx5FBXC4+r77h
lexznGLxVRhQL9VB3b8lwBAVgYp5YSGjKG5YufQ+kWuiuL9DZy2T917RxyvD9+D4
jK4S/bqIJXxCnTWiLIOPVkvbqYPsEazxu0uGlznmmzhzyzJCiYcZ1TQ/Jnn7nxhe
Xd1NbIoOEi2zfeFtxnqoMd9cYKcccFhrOyhRp1GHh2fah8dp7l/8NWvciiL+FdAl
rHzBPUYo8a0=
=xQ8f
-----END PGP SIGNATURE-----

« Back to bulletins