First published: Mon Sep 04 2017(Updated: )
ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/imagemagick | 8:6.9.10.23+dfsg-2.1+deb10u1 8:6.9.10.23+dfsg-2.1+deb10u5 8:6.9.11.60+dfsg-1.3+deb11u1 8:6.9.11.60+dfsg-1.6 8:6.9.12.98+dfsg1-4 8:6.9.12.98+dfsg1-5 | |
ImageMagick | =7.0.6-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-14137 is classified as a medium impact vulnerability due to excessive memory allocation.
To fix CVE-2017-14137, update ImageMagick to version 7.0.6-6 or later.
CVE-2017-14137 affects ImageMagick version 7.0.6-5 and earlier versions.
CVE-2017-14137 is caused by excessive memory allocation in the ReadWEBPImage function, which relies solely on a length field in the header.
Yes, CVE-2017-14137 can potentially be exploited remotely through specially crafted WEBP images.