First published: Fri Aug 18 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.26 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-12937.
The severity of CVE-2017-12937 is high with a score of 8.8.
The affected software is GraphicsMagick versions 1.3.26, 1.4+really1.3.35-1~deb10u2, 1.4+really1.3.35-1~deb10u3, 1.4+really1.3.36+hg16481-2+deb11u1, 1.4+really1.3.40-4, and 1.4+really1.3.42-1 on Debian. It is also affected on Ubuntu versions 1.3.23-1ubuntu0.3 (xenial) and 1.3.18-1ubuntu3.1+ (trusty).
To fix CVE-2017-12937, you should update to the patched versions: 1.4+really1.3.35-1~deb10u2, 1.4+really1.3.35-1~deb10u3, 1.4+really1.3.36+hg16481-2+deb11u1, 1.4+really1.3.40-4, or 1.4+really1.3.42-1 if you are using GraphicsMagick on Debian. On Ubuntu, update to version 1.3.23-1ubuntu0.3 (if using xenial) or version 1.3.18-1ubuntu3.1+ (if using trusty).
Yes, you can find more information about CVE-2017-12937 at the following references: - [Code Commit](http://hg.code.sf.net/p/graphicsmagick/code/rev/95d00d55e978) - [SecurityFocus](http://www.securityfocus.com/bid/100442) - [Gentoo Blog](https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-heap-based-buffer-overflow-in-readsunimage-sun-c/)