First published: Wed Aug 30 2017(Updated: )
GraphicsMagick 1.3.26 has a denial of service issue in ReadXBMImage() in a coders/xbm.c "Read hex image data" version!=10 case that results in the reader not returning; it would cause large amounts of CPU and memory consumption although the crafted file itself does not request it.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/graphicsmagick | 1.4+really1.3.36+hg16481-2+deb11u1 1.4+really1.3.40-4 1.4+really1.3.45-1 | |
GraphicsMagick | =1.3.26 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13776 is a denial-of-service vulnerability in GraphicsMagick 1.3.26 that results in high CPU and memory consumption.
CVE-2017-13776 affects GraphicsMagick versions 1.3.23-1ubuntu0.3 and earlier, as well as 1.3.18-1ubuntu3.1+ and earlier.
CVE-2017-13776 has a severity rating of 6.5 (High).
To fix CVE-2017-13776, update GraphicsMagick to version 1.3.23-1ubuntu0.3 or later for Ubuntu, or version 1.3.18-1ubuntu3.1+ or later for Trusty. Alternatively, update to a later version of GraphicsMagick that includes the necessary security patches.
You can find more information about CVE-2017-13776 on the following websites: [1] http://openwall.com/lists/oss-security/2017/08/31/2 [2] http://hg.code.sf.net/p/graphicsmagick/code/rev/233a720bfd5e [3] http://www.securityfocus.com/bid/100574