First published: Tue Aug 22 2017(Updated: )
In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.6-5 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13061 is a vulnerability in ImageMagick 7.0.6-5 that allows an attacker to cause a denial of service by exploiting a length-validation issue in the ReadPSDLayersInternal function.
CVE-2017-13061 has a severity rating of 6.5, which is considered medium.
ImageMagick 7.0.6-5 is affected by CVE-2017-13061.
To fix the CVE-2017-13061 vulnerability, it is recommended to update ImageMagick to a version that does not contain the vulnerability.
You can find more information about CVE-2017-13061 on the MITRE CVE website, Ubuntu Security Notices, and the NIST NVD.