<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:3256-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-23T11:22:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-23T11:22:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-23T11:22:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for ImageMagick fixes the following issues:

* CVE-2016-9556: Possible Heap-overflow found by fuzzing [bsc#1011130]
* CVE-2016-9559: Possible Null pointer access found by fuzzing [bsc#1011136]
* CVE-2016-8707: Possible code execution in the tiff deflate convert code [bsc#1014159]
* CVE-2016-9773: Possible Heap overflow in IsPixelGray [bsc#1013376]
* CVE-2016-8866: Possible memory allocation failure in AcquireMagickMemory [bsc#1009318]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-ImageMagick-12917,slessp4-ImageMagick-12917</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      <Description>Link for SUSE-SU-2016:3256-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:3256-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009318</URL>
      <Description>SUSE Bug 1009318</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011130</URL>
      <Description>SUSE Bug 1011130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011136</URL>
      <Description>SUSE Bug 1011136</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1013376</URL>
      <Description>SUSE Bug 1013376</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014159</URL>
      <Description>SUSE Bug 1014159</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7530/</URL>
      <Description>SUSE CVE CVE-2016-7530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8707/</URL>
      <Description>SUSE CVE CVE-2016-8707 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8866/</URL>
      <Description>SUSE CVE CVE-2016-8866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9556/</URL>
      <Description>SUSE CVE CVE-2016-9556 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9559/</URL>
      <Description>SUSE CVE CVE-2016-9559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9773/</URL>
      <Description>SUSE CVE CVE-2016-9773 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.4.3.6-7.60.1">
      <FullProductName ProductID="ImageMagick-6.4.3.6-7.60.1">ImageMagick-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.4.3.6-7.60.1">
      <FullProductName ProductID="ImageMagick-devel-6.4.3.6-7.60.1">ImageMagick-devel-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.4.3.6-7.60.1">
      <FullProductName ProductID="libMagick++-devel-6.4.3.6-7.60.1">libMagick++-devel-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++1-6.4.3.6-7.60.1">
      <FullProductName ProductID="libMagick++1-6.4.3.6-7.60.1">libMagick++1-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand1-6.4.3.6-7.60.1">
      <FullProductName ProductID="libMagickWand1-6.4.3.6-7.60.1">libMagickWand1-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand1-32bit-6.4.3.6-7.60.1">
      <FullProductName ProductID="libMagickWand1-32bit-6.4.3.6-7.60.1">libMagickWand1-32bit-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.4.3.6-7.60.1">
      <FullProductName ProductID="perl-PerlMagick-6.4.3.6-7.60.1">perl-PerlMagick-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore1-6.4.3.6-7.60.1">
      <FullProductName ProductID="libMagickCore1-6.4.3.6-7.60.1">libMagickCore1-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore1-32bit-6.4.3.6-7.60.1">
      <FullProductName ProductID="libMagickCore1-32bit-6.4.3.6-7.60.1">libMagickCore1-32bit-6.4.3.6-7.60.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libMagickCore1-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1">libMagickCore1-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-32bit-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1">libMagickCore1-32bit-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1">libMagickCore1-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-32bit-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1">libMagickCore1-32bit-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1">ImageMagick-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1">ImageMagick-devel-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1">libMagick++-devel-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++1-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1">libMagick++1-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand1-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1">libMagickWand1-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand1-32bit-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1">libMagickWand1-32bit-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.4.3.6-7.60.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1">perl-PerlMagick-6.4.3.6-7.60.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-7530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7530.html</URL>
        <Description>CVE-2016-7530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000399</URL>
        <Description>SUSE Bug 1000399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000703</URL>
        <Description>SUSE Bug 1000703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054924</URL>
        <Description>SUSE Bug 1054924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.</Note>
    </Notes>
    <CVE>CVE-2016-8707</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8707.html</URL>
        <Description>CVE-2016-8707</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014159</URL>
        <Description>SUSE Bug 1014159</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick 7.0.3.3 before 7.0.3.8 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862.</Note>
    </Notes>
    <CVE>CVE-2016-8866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8866.html</URL>
        <Description>CVE-2016-8866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007245</URL>
        <Description>SUSE Bug 1007245</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009318</URL>
        <Description>SUSE Bug 1009318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1031267</URL>
        <Description>SUSE Bug 1031267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.</Note>
    </Notes>
    <CVE>CVE-2016-9556</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9556.html</URL>
        <Description>CVE-2016-9556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011130</URL>
        <Description>SUSE Bug 1011130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013376</URL>
        <Description>SUSE Bug 1013376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2016-9559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9559.html</URL>
        <Description>CVE-2016-9559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011136</URL>
        <Description>SUSE Bug 1011136</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.</Note>
    </Notes>
    <CVE>CVE-2016-9773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.60.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.60.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163256-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9773.html</URL>
        <Description>CVE-2016-9773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1011130</URL>
        <Description>SUSE Bug 1011130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013376</URL>
        <Description>SUSE Bug 1013376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017421</URL>
        <Description>SUSE Bug 1017421</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
