GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (excessive memory allocation) because of an integer underflow in ReadPICTImage in coders/pict.c.
References
Link | Resource |
---|---|
http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset%3Bnode=0683f8724200 | |
http://www.securityfocus.com/bid/101183 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/ | |
https://sourceforge.net/p/graphicsmagick/bugs/511/ | Issue Tracking Patch Third Party Advisory |
https://sourceforge.net/p/graphicsmagick/code/ci/0683f8724200495059606c03f04e0d589b33ebe8/ | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/4232-1/ | |
https://www.debian.org/security/2018/dsa-4321 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-10-04 01:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14997
Mitre link : CVE-2017-14997
CVE.ORG link : CVE-2017-14997
JSON object : View
Products Affected
debian
- debian_linux
graphicsmagick
- graphicsmagick
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)