Alert - Vulnerability in ImageMagick

Number: AL16-007
Date: May 4, 2016

Purpose

The purpose of this alert is to bring attention to a recently disclosed vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. in ImageMagick.

Assessment

Through open source reporting, CCIRC has been made aware of a recently disclosed vulnerability in ImageMagick, that when exploited, can allow an attacker to remotely execute code without authentication AuthenticationA process or measure used to verify a users identity. .

ImageMagick is a popular image processing library that is leveraged by many websites. Websites that allow users to upload images, such as blogs, forums and social media, are especially vulnerable to exploitation.

Proof-of-concept exploit code has been released publicly, and the developer has indicated that a security fix will be released in the near future.

CVE Reference: CVE-2016–3714

Suggested action

Due to the potential risk presented by this vulnerability, CCIRC recommends that system administrators monitor for the developer released security fix. In the meantime, to aid with mitigation for this vulnerability, the developer and security researcher have released workarounds.

References

Security Researcher:
https://imagetragick.com/

Developer Acknowledgement:
https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588

Arstechnica - Huge number of sites imperiled by critical image-processing vulnerability:
http://arstechnica.com/security/2016/05/easily-exploited-bug-exposes-huge-number-of-sites-to-code-execution-attacks/

Date modified: