First published: Thu Sep 07 2017(Updated: )
In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.7-0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14174 is a vulnerability in ImageMagick 7.0.7-0 Q16 that can cause a denial of service (DoS) due to lack of an EOF (End of File) check.
CVE-2017-14174 can be exploited by providing a crafted PSD file with a large "length" field in the header but insufficient backing data.
CVE-2017-14174 has a severity rating of 6.5 (high).
ImageMagick 7.0.7-0 Q16 is affected by CVE-2017-14174.
To fix CVE-2017-14174, update to ImageMagick version 8:6.9.7.4+dfsg-16ubuntu2.2, 8:6.9.7.4+dfsg-16ubuntu6.2, 8:6.7.7.10-6ubuntu3.11, 8:6.9.9.34+dfsg-3, or 8:6.8.9.9-7ubuntu5.11, depending on your Ubuntu version, or apply the appropriate remedy for other distributions.