CVE-2013-4589

The ExportAlphaQuantumType function in export.c in GraphicsMagick before 1.3.18 might allow remote attackers to cause a denial of service (crash) via vectors related to exporting the alpha of an 8-bit RGBA image.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html Third Party Advisory
http://secunia.com/advisories/55288 Vendor Advisory
http://secunia.com/advisories/55721 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201311-10.xml Third Party Advisory
http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/ Exploit Patch
http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/ Exploit Patch
http://www.openwall.com/lists/oss-security/2013/11/15/14
http://www.securityfocus.com/bid/63002 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1019085 Issue Tracking
http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html Third Party Advisory
http://secunia.com/advisories/55288 Vendor Advisory
http://secunia.com/advisories/55721 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201311-10.xml Third Party Advisory
http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/ Exploit Patch
http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/ Exploit Patch
http://www.openwall.com/lists/oss-security/2013/11/15/14
http://www.securityfocus.com/bid/63002 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1019085 Issue Tracking
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
cpe:2.3:a:novell:suse_studio_onsite:1.3:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:graphicsmagick:graphicsmagick:*:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.13:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.14:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.15:*:*:*:*:*:*:*
cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.16:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120008.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html - Third Party Advisory
References () http://secunia.com/advisories/55288 - Vendor Advisory () http://secunia.com/advisories/55288 - Vendor Advisory
References () http://secunia.com/advisories/55721 - Vendor Advisory () http://secunia.com/advisories/55721 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201311-10.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201311-10.xml - Third Party Advisory
References () http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/ - Exploit, Patch () http://sourceforge.net/p/graphicsmagick/code/ci/1a2d7a38363f7f23b63d626887d22d39c7240144/ - Exploit, Patch
References () http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/ - Exploit, Patch () http://sourceforge.net/p/graphicsmagick/discussion/250737/thread/20888e8b/ - Exploit, Patch
References () http://www.openwall.com/lists/oss-security/2013/11/15/14 - () http://www.openwall.com/lists/oss-security/2013/11/15/14 -
References () http://www.securityfocus.com/bid/63002 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/63002 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1019085 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1019085 - Issue Tracking

Information

Published : 2013-11-23 11:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4589

Mitre link : CVE-2013-4589

CVE.ORG link : CVE-2013-4589


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_software_development_kit
  • suse_studio_onsite
  • suse_linux_enterprise_debuginfo

graphicsmagick

  • graphicsmagick

fedoraproject

  • fedora