First published: Thu Sep 07 2017(Updated: )
In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.6-1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14175 is a vulnerability in ImageMagick 7.0.6-1 Q16 that can cause a Denial of Service (DoS) due to lack of an EOF (End of File) check, leading to high CPU consumption.
CVE-2017-14175 affects ImageMagick versions 7.0.6-1 Q16 and earlier.
CVE-2017-14175 has a severity rating of 6.5 (High).
To fix CVE-2017-14175, upgrade ImageMagick to version 8:6.7.7.10-6ubuntu3.11, 8:6.9.9.34+dfsg-3, 8:6.8.9.9-7ubuntu5.11, 8:6.9.7.4+dfsg-16ubuntu2.2, 8:6.9.7.4+dfsg-16ubuntu6.2, 7.0.6-1, 8:6.9.10.23+dfsg-2.1+deb10u1, 8:6.9.10.23+dfsg-2.1+deb10u5, 8:6.9.11.60+dfsg-1.3+deb11u1, 8:6.9.11.60+dfsg-1.6, 8:6.9.12.98+dfsg1-2, depending on your system.
You can find more information about CVE-2017-14175 at the following references: [link1](https://github.com/ImageMagick/ImageMagick/issues/712), [link2](https://security.gentoo.org/glsa/201711-07), [link3](https://usn.ubuntu.com/3681-1/).