First published: Mon Sep 18 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ImageMagick ImageMagick | =7.0.6 | |
Debian Debian Linux | =9.0 | |
debian/imagemagick | 8:6.9.11.60+dfsg-1.3+deb11u4 8:6.9.11.60+dfsg-1.3+deb11u3 8:6.9.11.60+dfsg-1.6+deb12u2 8:6.9.11.60+dfsg-1.6+deb12u1 8:7.1.1.39+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14528 is a vulnerability in ImageMagick 7.0.6 that allows remote attackers to cause a denial of service through a use-after-free after an invalid call to TIFFSetField.
The function has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which can be exploited to cause the use-after-free vulnerability.
The severity of CVE-2017-14528 is medium with a CVSS score of 6.5.
Attackers can exploit this vulnerability to cause a denial of service by using a crafted TIFF file.
To fix CVE-2017-14528, update ImageMagick to version 8:6.9.10.23+dfsg-2.1+deb10u1, 8:6.9.10.23+dfsg-2.1+deb10u5, 8:6.9.11.60+dfsg-1.3+deb11u1, or 8:6.9.11.60+dfsg-1.6.