First published: Wed Aug 30 2017(Updated: )
GraphicsMagick 1.3.26 has a denial of service issue in ReadJNXImage() in coders/jnx.c whereby large amounts of CPU and memory resources may be consumed although the file itself does not support the requests.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphicsmagick Graphicsmagick | =1.3.26 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-13775 is high with a severity value of 6.5.
GraphicsMagick 1.3.26 is affected by CVE-2017-13775.
CVE-2017-13775 can be exploited by specially crafted JNX files, which can cause high CPU and memory resource consumption.
Yes, there are fixes available for CVE-2017-13775. Please refer to the official sources for remediation steps.
You can find more information about CVE-2017-13775 on the provided references: http://openwall.com/lists/oss-security/2017/08/31/3, http://hg.code.sf.net/p/graphicsmagick/code/rev/b037d79b6ccd, http://www.securityfocus.com/bid/100570