GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:311:12.
References
Link | Resource |
---|---|
http://hg.code.sf.net/p/graphicsmagick/code/rev/54f48ab2d52a | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/100474 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/ | |
https://sourceforge.net/p/graphicsmagick/bugs/436/ | Third Party Advisory |
https://usn.ubuntu.com/4222-1/ | |
https://www.debian.org/security/2018/dsa-4321 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-08-22 06:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-13064
Mitre link : CVE-2017-13064
CVE.ORG link : CVE-2017-13064
JSON object : View
Products Affected
debian
- debian_linux
graphicsmagick
- graphicsmagick
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer